Skip to main content

The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments
draft-ietf-pkix-lightweight-ocsp-profile-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Ted Hardie
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Chris Newman
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
11 (System) post-migration administrative database adjustment to the Yes position for Russ Housley
2007-07-25
11 (System) IANA Action state changed to No IC from In Progress
2007-07-25
11 (System) IANA Action state changed to In Progress
2007-07-23
11 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-07-23
11 Amy Vezza IESG state changed to Approved-announcement sent
2007-07-23
11 Amy Vezza IESG has approved the document
2007-07-23
11 Amy Vezza Closed "Approve" ballot
2007-07-22
11 Russ Housley State Changes to Approved-announcement to be sent from Waiting for AD Go-Ahead by Russ Housley
2007-06-29
11 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-06-26
11 Yoshiko Fong IANA Last Call Comments:

As described in the IANA Considerations section, we
understand this document to have NO IANA Actions.
2007-06-20
11 Chris Newman
[Ballot comment]
This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for …
[Ballot comment]
This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-06-20
11 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman
2007-06-15
11 Amy Vezza Last call sent
2007-06-15
11 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-06-15
11 Russ Housley Last Call was requested by Russ Housley
2007-06-15
11 Russ Housley State Changes to Last Call Requested from IESG Evaluation::AD Followup by Russ Housley
2007-06-14
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-06-14
11 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-11.txt
2007-05-02
11 Russ Housley State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Russ Housley
2007-04-20
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-04-20
10 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-10.txt
2007-04-20
11 (System) Removed from agenda for telechat - 2007-04-19
2007-04-19
11 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2007-04-19
11 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-04-19
11 Magnus Westerlund [Ballot comment]
The document fails to spell out acronyms at their first usage.
2007-04-19
11 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2007-04-19
11 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-04-19
11 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does not use the
"Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that
should be removed.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-04-19
11 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to Discuss from Undefined by Chris Newman
2007-04-19
11 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to Undefined from Discuss by Chris Newman
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does not use the
"Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that
should be removed.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does not use the
"Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that
should be removed.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

A lot of hotels (and similar access points) have HTTP interception
proxies running on port 80.  Often those proxies require use of https
to initially pay the bill with certificates that a client might wish
to check.  As this is running on port 80 as well, there would seem to be
a bootstrap problem that might not be present if a much more restricted
protocol was used on a different port.  I suppose this problem is also
true for OCSP, so I won't insist this be addressed.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does not use the
"Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that
should be removed.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

A lot of hotels (and similar access points) have HTTP interception
proxies running on port 80.  Often those proxies require use of https
to initially pay the bill with certificates that a client might wish
to check.  As this is running on port 80 as well, there would seem to be
a bootstrap problem that might not be present if a much more restricted
protocol was used on a different port.  That may have security
implications as well.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does not use the
"Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that
should be removed.  Please add an RFC editor note to fix this.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

A lot of hotels (and similar access points) have HTTP interception
proxies running on port 80.  Often those proxies require use of https
to initially pay the bill with certificates that a client might wish
to check.  As this is running on port 80 as well, there would seem to be
a bootstrap problem that might not be present if a much more restricted
protocol was used on a different port.  That may have security
implications as well.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers --
they use "=" instead of ":".  Also, HTTP does not use the
"Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that
should be removed.  Please add an RFC editor note to fix this.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging
in the security considerations section as this profile suggests
aggressive caching and use of proxies.

I do think this profile would be improved by applying BCP 56 (at the very
least assigning a port other than port 80), but I'm willing to just
abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":".  Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed.  Please add an RFC editor note to fix this.

This may be subject to some of the issues in RFC 3143.  I suspect the
Vary header should not be used, for example.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies.  This should probably lead to specific advice about the strictness of the HTTP parsers on the server and how HTTP persistent connections are used when error conditions occur.

I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":".  Also, HTTP does …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":".  Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed.  Please add an RFC editor note to fix this.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies.  This should probably lead to specific advice about the strictness of the HTTP parsers on the server and how HTTP persistent connections are used when error conditions occur.

I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed.
2007-04-19
11 Chris Newman
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":".  Please add an …
[Ballot discuss]
Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":".  Please add an RFC editor note to fix this.

I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies.  This should probably lead to specific advice about the strictness of the HTTP parsers on the server and how HTTP persistent connections are used when error conditions occur.

I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed.
2007-04-19
11 Chris Newman [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman
2007-04-18
11 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-04-18
11 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-04-16
09 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-09.txt
2007-04-12
11 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2007-04-09
11 Russ Housley Placed on agenda for telechat - 2007-04-19 by Russ Housley
2007-04-09
11 Russ Housley State Changes to IESG Evaluation from AD is watching by Russ Housley
2007-04-09
11 Russ Housley State Changes to AD is watching from Waiting for AD Go-Ahead by Russ Housley
2007-03-19
11 Yoshiko Fong IANA Last Call Comment:

As described in the IANA Considerations section, we understand
this document to have NO IANA Actions.
2007-03-19
11 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-03-13
11 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2007-03-05
11 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-03-05
11 Amy Vezza State Changes to Last Call Requested from AD is watching by Amy Vezza
2007-03-05
11 Amy Vezza Last Call was requested by Amy Vezza
2007-02-20
08 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-08.txt
2007-02-17
11 Russ Housley State Changes to AD is watching from IESG Evaluation::AD Followup by Russ Housley
2007-02-17
11 Russ Housley Intended Status has been changed to Proposed Standard from Informational
2007-02-12
11 Russ Housley State Changes to IESG Evaluation::AD Followup from IESG Evaluation::Revised ID Needed by Russ Housley
2007-01-23
11 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Yes from Discuss by Russ Housley
2007-01-05
11 Russ Housley
[Ballot discuss]
Assume that the relying party has a certification path to validate, and
two of the certificates in the path contain AIA extensions that …
[Ballot discuss]
Assume that the relying party has a certification path to validate, and
two of the certificates in the path contain AIA extensions that point to
the same OCSP Responder.

The relying party generates an OCSP request, including both of the
certificates.  RFC 2560 allows one or more certificate to be named in
the OCSP Request (SEQUENCE OF Request), and I could not find any text to
indicate that support for more than one element in this sequence is not
mandatory.

The OCSP Responder generates an OCSP response for both of the
certificates (SEQUENCE OF SingleResponse).  This response is covered
by one signature.

So, there are three cases to consider:

(1) OCSP Responder with a signature key - there is not a concern here.
    The OCSP Responder builds the response and signs it.

(2) OCSP Responder that can relay to a server with a signature key - there
    is not a concern here.  The OCSP Responder forwards the request to
    the server with a signature key, the server builds the response and
    signs it, and then the signed response is sent back to the original
    responder.

(3) OCSP Responder with a bunch of cached responses - there is a concern
    here.  The responder cannot respond to the multi-certificate request
    unless responses for every possible combination of requested
    certificates is computed and cached.  This would be computationally
    prohibitive for a certificate population of any significant size.

I see two ways forward: RFC 2560bis, or include a very small update to
RFC 2560 in this document to explain the possible meanings of the error
codes.
2007-01-05
11 Russ Housley
[Ballot discuss]
Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that …
[Ballot discuss]
Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that point to the same OCSP Responder.

The relying party generates an OCSP request, including both of the certificates.  RFC 2560 allows one or more certificate to be named in the OCSP Request (SEQUENCE OF Request), and I could not find any text to indicate that support for more than one element in this sequence is not mandatory.

The OCSP Responder generates an OCSP response for both of the certificates (SEQUENCE OF SingleResponse).  This response is covered by one signature.

So, there are three cases to consider:

(1) OCSP Responder with a signature key - there is not a concern here.  The OCSP Responder builds the response and signs it.

(2) OCSP Responder that can relay to a server with a signature key - there is not a concern here.  The OCSP Responder forwards the request to the server with a signature key, the server builds the response and signs it, and then the signed response is sent back to the original responder.

(3) OCSP Responder with a bunch of cached responses - there is a concern here.  The responder cannot respond to the multi-certificate request unless responses for every possible combination of requested certificates is computed and cached.  This would be computationally prohibitive for a certificate population of any significant size.

I see two ways forward: RFC 2560bis, or include a very small update to
RFC 2560 in this document to explain the possible meanings of the error
codes.
2006-12-07
11 Russ Housley State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Russ Housley
2006-11-14
11 Russ Housley
[Ballot discuss]
Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that …
[Ballot discuss]
Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that point to the same OCSP Responder.

The relying party generates an OCSP request, including both of the certificates.  RFC 2560 allows one or more certificate to be named in the OCSP Request (SEQUENCE OF Request), and I could not find any text to indicate that support for more than one element in this sequence is not mandatory.

The OCSP Responder generates an OCSP response for both of the certificates (SEQUENCE OF SingleResponse).  This response is covered by one signature.

So, there are three cases to consider:

(1) OCSP Responder with a signature key - there is not a concern here.  The OCSP Responder builds the response and signs it.

(2) OCSP Responder that can relay to a server with a signature key - there is not a concern here.  The OCSP Responder forwards the request to the server with a signature key, the server builds the response and signs it, and then the signed response is sent back to the original responder.

(3) OCSP Responder with a bunch of cached responses - there is a concern here.  The responder cannot respond to the multi-certificate request unless responses for every possible combination of requested certificates is computed and cached.  This would be computationally prohibitive for a certificate population of any significant size.

The only way forward that I see is RFC 2560bis.
2006-11-14
11 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Discuss from Yes by Russ Housley
2006-11-08
11 (System) Request for Early review by SECDIR Completed. Reviewer: Jeffrey Hutzelman.
2006-10-04
11 Sam Hartman
[Ballot discuss]
>  It is intended that the normative requirements defined in this
>  profile will be adopted by OCSP clients and OCSP responders
>  …
[Ballot discuss]
>  It is intended that the normative requirements defined in this
>  profile will be adopted by OCSP clients and OCSP responders
>  operating in very large scale (high volume) PKI environments or PKI
>  environments that require a lightweight solution to minimize
>  bandwidth and client side processing power (or both), as described
>  above.  As OCSP does not have the means to signal responder
>  capabilities within the protocol, clients need to rely on out of
>  band mechanisms to determine when a responder operates according to
>  this profile and, as such, when the requirements of this profile
>  apply.  In the case where an out of band mechanisms may not be
>  available, this profile ensures that interoperability will still
>  occur between a fully conformant OCSP 2560 client and a responder
>  that is operating in a mode as described in this specification.

First, I'm nervous about the spec claiming to make normative
requirements when it is being published off the standards track.
However my primary concern at this point is that I don't see how the claim of the last sentence is actually guaranteed.  For example  what happens when a client includes multiple certificates in a request?  Will this actually work?


Perhaps one way forward is to note that servers cannot assume that
clients will follow the MUSTS of this profile.  They can only assume
the behavior of 2560.
2006-10-03
11 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Discuss by Ted Hardie
2006-10-02
07 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-07.txt
2006-08-04
11 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2006-08-03
11 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault
2006-08-03
11 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko by Jari Arkko
2006-08-02
11 David Kessens
[Ballot comment]
Comments received by Frank Kastenholz from the Ops Directorate:

as this is a profile ('how to make it work') document, i'd make
the …
[Ballot comment]
Comments received by Frank Kastenholz from the Ops Directorate:

as this is a profile ('how to make it work') document, i'd make
the same points that i made for draft-ietf-pki4ipsec-ikecert-profile-10.txt.

one added question, section 1.1.1 of the document
says that clients must use SHA1 to authenticate some data.
Is it wise to mandate a crypto algorithm in this manner?
given the history that shows that crypto-algorithms
eventually weaken and then succumb to attacks of various forms,
so won't sha1 also succumb?

i don't know how to solve this problem; perhaps
there should be an ietf-web-page someplace
that shows the status of algorithms?xo
2006-08-02
11 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2006-08-02
11 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings
2006-08-02
11 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert
2006-08-02
11 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu
2006-07-31
11 Ted Hardie
[Ballot discuss]
I share some of Sam's concerns that this document appears to be making normative requirements that affect OCSP itself.  My own reading is …
[Ballot discuss]
I share some of Sam's concerns that this document appears to be making normative requirements that affect OCSP itself.  My own reading is that this text from the Introduction is the core of the issue:

  As OCSP does not have the means to signal responder
  capabilities within the protocol, clients need to rely on out of
  band mechanisms to determine when a responder operates according to
  this profile and, as such, when the requirements of this profile
  apply.

I assume from this that every server and every client using this profile must, in fact, be a full-fledged OCSP responder or client, as they will have no way to determine in-band whether this profile is in use or not.  If this not correct, then an applicability statement that describes when a restricted client or server may be deployed is in order.

It's not entirely clear how much this behavior relies on both parties following the profile.  In 1.1.2, the statement that a server MAY ignore a signature indicates, for example, that it may optimize its response processing in this way without regards to the client's wishes--as the client's inclusion of the signature is a moderately strong signal that it is not following the profile.  If there are any cases where the client or server's failure to follow this spec should trigger a failover to default OCSP behavior, then it would probably be better to flag those; as it stands, it appears that each item in the profile is an incremental benefit in lightening the weight of OCSP and will not damage things if deployed alone.  If that is *not* the case, clarifying text is needed.

In section 1.2.4, the documents says:

    For the purposes of this profile, GeneralizedTime values such as
  thisUpdate, nextUpdate and producedAt MUST be expressed Greenwich
  Mean Time (Zulu) and MUST include seconds (i.e.,times are
  YYYYMMDDHHMMSSZ), even where the number of seconds is zero.

The inclusion of the parenthetical time YYYMMDDHHMMSSZ is confusing, as it does not
match either the examples or the HTTP date specified in Section 3.3 of RFC 2616.

In section 4, the document says:

  The OCSP responder MUST support requests and responses over HTTP. 
  When sending requests that are smaller than 255 bytes in total
  (after encoding) including the method (http://)

That's not an HTTP Method, it is a URI scheme (http) and delimiters, used to introduce
an authority section.  "including the scheme and delimiters (http://)" would be appropriate.

The length limit of 255 seems to run contrary to HTTP's design; why is not appropriate
to follow the advice of Section 3.2.1 of RFC 2616:

The HTTP protocol does not place any a priori limit on the length of a
URI. Servers MUST be able to handle the URI of any resource they serve,
and SHOULD be able to handle URIs of unbounded length if they provide
GET-based forms that could generate such URIs. A server SHOULD return
414 (Request-URI Too Long) status if a URI is longer than the server can
handle (see section 10.4.15).

The older client implementations NOTED below in 3.2.1 don't seem to be a likely issue
for anything capable of running this as profile; is the concern proxies?  Is
there any evidence of this as a problem in this environment?  Would allowing
Pragma: No-cache (an HTTP 1.0 directive) but not Cache-Control directives
help eliminate the proxy problem?

Section 2.2 appears to set behavior for when OCSP is invoked, rather than profile
how OCSP is used.  This does not seem to be actionable with the RFC 2119 language
used.  This seems to be more "good practice is to check what you can check locally
before bothering the network/server".  Am I misunderstanding the intent here?

In Section 5.3, the document says:

  This functionality has been specified as an extension to the TLS
  [TLS] protocol in Section 3.6 [TLSEXT], but can be applied to any
  client-server protocol.

It is not clear to me whether this is meant to apply on to aps running over TLS or
any client server application.
2006-07-31
11 Ted Hardie [Ballot Position Update] New position, Discuss, has been recorded for Ted Hardie by Ted Hardie
2006-07-31
11 Sam Hartman
[Ballot discuss]
It's very confusing when an IETF working group publishes informational
documents with a lot of normative requirements--particular documents
that are related to existing …
[Ballot discuss]
It's very confusing when an IETF working group publishes informational
documents with a lot of normative requirements--particular documents
that are related to existing protocols.  This document clearly can be
published as a proposed standard if there is sufficient consensus: it
has testable requirements and specifies protocol behavior.  I think
this document should be moved to the standards track if there is
sufficient consensus.  If there is not consensus to publish on the
standards track then we should add some text to the draft explaining
its relation to the OCSP protocol spec and explaining what
reservations prevented us from publishing on the standards track.  We
would definitely need a statement saying that while the requirements
of this profile are believed to be compatible with OCSP, the OCSP spec
is definitive in case of conflict.

I'm particularly concerned about two issues which seem to skirt the
boundary of normative changes to OCSP itself.  First, the handling of
nonces seems to be close to normative.  I could not find a direct
conflict with the OCSP spec because it says so little about nonces.
The requirement that servers need not check client signatures
definitely seems like a normative change.  While the validation of
client requests is not covered in great depth, the strong common sense
presumption is that client authentication should be verified when
present.  I have no problem with these if this document is on the
standards track but am uncomfortable especially with the lack of
signature checking as an informational document.
2006-07-31
11 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2006-07-31
11 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2006-07-24
11 Yoshiko Fong IANA Last Call Comment:

As described in the IANA Considerations section, we understand this document
to have NO IANA Actions.
2006-07-18
11 Russ Housley State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Russ Housley
2006-07-18
11 Russ Housley Placed on agenda for telechat - 2006-08-03 by Russ Housley
2006-07-18
11 Russ Housley [Ballot Position Update] New position, Yes, has been recorded for Russ Housley
2006-07-18
11 Russ Housley Ballot has been issued by Russ Housley
2006-07-18
11 Russ Housley Created "Approve" ballot
2006-07-17
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-07-17
06 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-06.txt
2006-06-30
11 Russ Housley State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Russ Housley
2006-06-30
11 Russ Housley
A revised I-D is needed to address the Last Call comments.  The authors have been very responsive, so I expect the revised I-D to be …
A revised I-D is needed to address the Last Call comments.  The authors have been very responsive, so I expect the revised I-D to be posted soon.
2006-06-29
11 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2006-06-15
11 Michael Lee State Changes to In Last Call from Last Call Requested by Michael Lee
2006-06-14
11 Russ Housley State Changes to Last Call Requested from AD Evaluation by Russ Housley
2006-06-14
11 Russ Housley Last Call was requested by Russ Housley
2006-06-14
11 Russ Housley State Changes to AD Evaluation from Last Call Requested by Russ Housley
2006-06-14
11 Russ Housley State Change Notice email list have been change to pkix-chairs@tools.ietf.org, alex@verisign.com, rmh@microsoft.com from pkix-chairs@tools.ietf.org
2006-06-14
11 Russ Housley Last Call was requested by Russ Housley
2006-06-14
11 Russ Housley State Changes to Last Call Requested from AD Evaluation by Russ Housley
2006-06-14
11 (System) Ballot writeup text was added
2006-06-14
11 (System) Last call text was added
2006-06-14
11 (System) Ballot approval text was added
2006-06-14
11 Russ Housley State Changes to AD Evaluation from Publication Requested by Russ Housley
2006-06-14
11 Russ Housley State Change Notice email list have been change to pkix-chairs@tools.ietf.org, alex@verisign.com, rmh@microsoft.com from pkix-chairs@tools.ietf.org
2006-05-23
11 Russ Housley Draft Added by Russ Housley in state Publication Requested
2006-05-19
05 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-05.txt
2006-03-29
04 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-04.txt
2006-01-18
03 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-03.txt
2005-07-18
02 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-02.txt
2004-10-27
01 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-01.txt
2004-10-01
00 (System) New version available: draft-ietf-pkix-lightweight-ocsp-profile-00.txt