OCSP Service Has Reached End of Life

Overall reaction to OCSP end-of-life

  • Many commenters are glad to see OCSP go, calling it poorly designed, privacy-hostile, and fragile (fail-open, easy to block, DoS-prone).
  • Others argue OCSP stapling was a reasonable stopgap when certificates lasted many years; with 90-day (and future 47-day) certs, its value is much lower.

OCSP vs short-lived certs and revocation

  • Strong camp: short-lived certificates (days, eventually 24h) plus Certificate Transparency (CT) are strictly better than OCSP/stapling for web TLS.
  • Counterpoint: you still can’t force early expiration after compromise; revocation (via OCSP/CRL/CRLite) is still needed, especially for longer-lived non‑TLS or offline uses.
  • One argument suggests “just reissue a cert” instead of revocation; rebuttal is that this doesn’t help when the server is compromised and still serving the old cert.

CRLs, CRLite, CRLSets, and browser behavior

  • CRLs are seen as ugly but now the main path, with scale problems (size, propagation delay, need for tricks like Bloom filters).
  • Firefox’s CRLite is viewed as a workable central revocation mechanism that doesn’t require server changes.
  • Chrome’s CRLSets are criticized as a Google‑controlled, pre-filtered blacklist that doesn’t cover all revoked certs, especially for internal CAs; defenders note this “central list” model is now common.
  • Some discussion on Firefox’s security.OCSP.require: for LE certs without OCSP URLs it likely does nothing, and Firefox already relies more on CRLite.

Certificate lifetimes, enforcement, and CT

  • Debate over whether lifetime limits are enforced by CAs or browsers:
    • Public roots: browsers enforce maximum lifetimes, and CT makes long-lived mis-issuance quickly visible.
    • Custom roots: browsers often exempt them; very long-lived internal certs can still work.
  • Extremely short lifetimes (e.g., 24h) would greatly increase CT volume and make full-log scanning difficult for smaller operators.

DNS, DANE, and centralization

  • Long thread on whether TLS PKI is “more centralized” than DNS:
    • One side: DNS (TLDs, registries) is highly centralized; governments and registries can manipulate zones.
    • Other side: WebPKI is effectively controlled by a small set of browser vendors and a CA cartel; some argue security is no better than DNS-based schemes.
  • DANE/DNSSEC is mentioned as a theoretical alternative (publishing keys/revocation in DNS), but practical deployment, middleboxes, revocation, and migration issues are seen as blocking.

Non-browser and enterprise impacts

  • Concern that non-browser clients now lack a practical revocation channel, especially in mTLS, secure boot, or enterprise/internal PKI scenarios where OCSP is still used.
  • Chrome reportedly does not check CRLs for internal CAs by default, relying instead on enterprise policy configuration.
  • Air-gapped or special-purpose environments may need CRL-only roots or other custom mechanisms.

Operational/edge notes

  • OCSP requiring port 80 sometimes clashes with “HTTPS-only” enterprise policies.
  • One person wonders if OCSP/LE changes affected HSTS behavior for a production site; others don’t provide a clear answer.
  • Some note that for Let’s Encrypt certs without OCSP URLs, OCSP-related browser settings effectively become moot.