The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments
draft-ietf-pkix-lightweight-ocsp-profile-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Ted Hardie |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Sam Hartman |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the Yes position for Russ Housley |
2007-07-25
|
11 | (System) | IANA Action state changed to No IC from In Progress |
2007-07-25
|
11 | (System) | IANA Action state changed to In Progress |
2007-07-23
|
11 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-07-23
|
11 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-07-23
|
11 | Amy Vezza | IESG has approved the document |
2007-07-23
|
11 | Amy Vezza | Closed "Approve" ballot |
2007-07-22
|
11 | Russ Housley | State Changes to Approved-announcement to be sent from Waiting for AD Go-Ahead by Russ Housley |
2007-06-29
|
11 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-06-26
|
11 | Yoshiko Fong | IANA Last Call Comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2007-06-20
|
11 | Chris Newman | [Ballot comment] This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for … [Ballot comment] This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-06-20
|
11 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2007-06-15
|
11 | Amy Vezza | Last call sent |
2007-06-15
|
11 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-06-15
|
11 | Russ Housley | Last Call was requested by Russ Housley |
2007-06-15
|
11 | Russ Housley | State Changes to Last Call Requested from IESG Evaluation::AD Followup by Russ Housley |
2007-06-14
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-06-14
|
11 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-11.txt |
2007-05-02
|
11 | Russ Housley | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Russ Housley |
2007-04-20
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-04-20
|
10 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-10.txt |
2007-04-20
|
11 | (System) | Removed from agenda for telechat - 2007-04-19 |
2007-04-19
|
11 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2007-04-19
|
11 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2007-04-19
|
11 | Magnus Westerlund | [Ballot comment] The document fails to spell out acronyms at their first usage. |
2007-04-19
|
11 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2007-04-19
|
11 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-04-19
|
11 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to Discuss from Undefined by Chris Newman |
2007-04-19
|
11 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to Undefined from Discuss by Chris Newman |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. A lot of hotels (and similar access points) have HTTP interception proxies running on port 80. Often those proxies require use of https to initially pay the bill with certificates that a client might wish to check. As this is running on port 80 as well, there would seem to be a bootstrap problem that might not be present if a much more restricted protocol was used on a different port. I suppose this problem is also true for OCSP, so I won't insist this be addressed. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. A lot of hotels (and similar access points) have HTTP interception proxies running on port 80. Often those proxies require use of https to initially pay the bill with certificates that a client might wish to check. As this is running on port 80 as well, there would seem to be a bootstrap problem that might not be present if a much more restricted protocol was used on a different port. That may have security implications as well. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. Please add an RFC editor note to fix this. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. A lot of hotels (and similar access points) have HTTP interception proxies running on port 80. Often those proxies require use of https to initially pay the bill with certificates that a client might wish to check. As this is running on port 80 as well, there would seem to be a bootstrap problem that might not be present if a much more restricted protocol was used on a different port. That may have security implications as well. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. Please add an RFC editor note to fix this. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. Please add an RFC editor note to fix this. This may be subject to some of the issues in RFC 3143. I suspect the Vary header should not be used, for example. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. This should probably lead to specific advice about the strictness of the HTTP parsers on the server and how HTTP persistent connections are used when error conditions occur. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Also, HTTP does not use the "Content-Transfer-Encoding" header (RFC 2616 section 19.4.5) so that should be removed. Please add an RFC editor note to fix this. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. This should probably lead to specific advice about the strictness of the HTTP parsers on the server and how HTTP persistent connections are used when error conditions occur. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Please add an … [Ballot discuss] Some of the example HTTP headers in section 4 are not valid headers -- they use "=" instead of ":". Please add an RFC editor note to fix this. I'd also like to see an anaylsis of the impact of HTTP Request Smugging in the security considerations section as this profile suggests aggressive caching and use of proxies. This should probably lead to specific advice about the strictness of the HTTP parsers on the server and how HTTP persistent connections are used when error conditions occur. I do think this profile would be improved by applying BCP 56 (at the very least assigning a port other than port 80), but I'm willing to just abstain if that isn't fixed. |
2007-04-19
|
11 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2007-04-18
|
11 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2007-04-18
|
11 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2007-04-16
|
09 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-09.txt |
2007-04-12
|
11 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2007-04-09
|
11 | Russ Housley | Placed on agenda for telechat - 2007-04-19 by Russ Housley |
2007-04-09
|
11 | Russ Housley | State Changes to IESG Evaluation from AD is watching by Russ Housley |
2007-04-09
|
11 | Russ Housley | State Changes to AD is watching from Waiting for AD Go-Ahead by Russ Housley |
2007-03-19
|
11 | Yoshiko Fong | IANA Last Call Comment: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2007-03-19
|
11 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-03-13
|
11 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
2007-03-05
|
11 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-03-05
|
11 | Amy Vezza | State Changes to Last Call Requested from AD is watching by Amy Vezza |
2007-03-05
|
11 | Amy Vezza | Last Call was requested by Amy Vezza |
2007-02-20
|
08 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-08.txt |
2007-02-17
|
11 | Russ Housley | State Changes to AD is watching from IESG Evaluation::AD Followup by Russ Housley |
2007-02-17
|
11 | Russ Housley | Intended Status has been changed to Proposed Standard from Informational |
2007-02-12
|
11 | Russ Housley | State Changes to IESG Evaluation::AD Followup from IESG Evaluation::Revised ID Needed by Russ Housley |
2007-01-23
|
11 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to Yes from Discuss by Russ Housley |
2007-01-05
|
11 | Russ Housley | [Ballot discuss] Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that … [Ballot discuss] Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that point to the same OCSP Responder. The relying party generates an OCSP request, including both of the certificates. RFC 2560 allows one or more certificate to be named in the OCSP Request (SEQUENCE OF Request), and I could not find any text to indicate that support for more than one element in this sequence is not mandatory. The OCSP Responder generates an OCSP response for both of the certificates (SEQUENCE OF SingleResponse). This response is covered by one signature. So, there are three cases to consider: (1) OCSP Responder with a signature key - there is not a concern here. The OCSP Responder builds the response and signs it. (2) OCSP Responder that can relay to a server with a signature key - there is not a concern here. The OCSP Responder forwards the request to the server with a signature key, the server builds the response and signs it, and then the signed response is sent back to the original responder. (3) OCSP Responder with a bunch of cached responses - there is a concern here. The responder cannot respond to the multi-certificate request unless responses for every possible combination of requested certificates is computed and cached. This would be computationally prohibitive for a certificate population of any significant size. I see two ways forward: RFC 2560bis, or include a very small update to RFC 2560 in this document to explain the possible meanings of the error codes. |
2007-01-05
|
11 | Russ Housley | [Ballot discuss] Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that … [Ballot discuss] Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that point to the same OCSP Responder. The relying party generates an OCSP request, including both of the certificates. RFC 2560 allows one or more certificate to be named in the OCSP Request (SEQUENCE OF Request), and I could not find any text to indicate that support for more than one element in this sequence is not mandatory. The OCSP Responder generates an OCSP response for both of the certificates (SEQUENCE OF SingleResponse). This response is covered by one signature. So, there are three cases to consider: (1) OCSP Responder with a signature key - there is not a concern here. The OCSP Responder builds the response and signs it. (2) OCSP Responder that can relay to a server with a signature key - there is not a concern here. The OCSP Responder forwards the request to the server with a signature key, the server builds the response and signs it, and then the signed response is sent back to the original responder. (3) OCSP Responder with a bunch of cached responses - there is a concern here. The responder cannot respond to the multi-certificate request unless responses for every possible combination of requested certificates is computed and cached. This would be computationally prohibitive for a certificate population of any significant size. I see two ways forward: RFC 2560bis, or include a very small update to RFC 2560 in this document to explain the possible meanings of the error codes. |
2006-12-07
|
11 | Russ Housley | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Russ Housley |
2006-11-14
|
11 | Russ Housley | [Ballot discuss] Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that … [Ballot discuss] Assume that the relying party has a certification path to validate, and two of the certificates in the path contain AIA extensions that point to the same OCSP Responder. The relying party generates an OCSP request, including both of the certificates. RFC 2560 allows one or more certificate to be named in the OCSP Request (SEQUENCE OF Request), and I could not find any text to indicate that support for more than one element in this sequence is not mandatory. The OCSP Responder generates an OCSP response for both of the certificates (SEQUENCE OF SingleResponse). This response is covered by one signature. So, there are three cases to consider: (1) OCSP Responder with a signature key - there is not a concern here. The OCSP Responder builds the response and signs it. (2) OCSP Responder that can relay to a server with a signature key - there is not a concern here. The OCSP Responder forwards the request to the server with a signature key, the server builds the response and signs it, and then the signed response is sent back to the original responder. (3) OCSP Responder with a bunch of cached responses - there is a concern here. The responder cannot respond to the multi-certificate request unless responses for every possible combination of requested certificates is computed and cached. This would be computationally prohibitive for a certificate population of any significant size. The only way forward that I see is RFC 2560bis. |
2006-11-14
|
11 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to Discuss from Yes by Russ Housley |
2006-11-08
|
11 | (System) | Request for Early review by SECDIR Completed. Reviewer: Jeffrey Hutzelman. |
2006-10-04
|
11 | Sam Hartman | [Ballot discuss] > It is intended that the normative requirements defined in this > profile will be adopted by OCSP clients and OCSP responders > … [Ballot discuss] > It is intended that the normative requirements defined in this > profile will be adopted by OCSP clients and OCSP responders > operating in very large scale (high volume) PKI environments or PKI > environments that require a lightweight solution to minimize > bandwidth and client side processing power (or both), as described > above. As OCSP does not have the means to signal responder > capabilities within the protocol, clients need to rely on out of > band mechanisms to determine when a responder operates according to > this profile and, as such, when the requirements of this profile > apply. In the case where an out of band mechanisms may not be > available, this profile ensures that interoperability will still > occur between a fully conformant OCSP 2560 client and a responder > that is operating in a mode as described in this specification. First, I'm nervous about the spec claiming to make normative requirements when it is being published off the standards track. However my primary concern at this point is that I don't see how the claim of the last sentence is actually guaranteed. For example what happens when a client includes multiple certificates in a request? Will this actually work? Perhaps one way forward is to note that servers cannot assume that clients will follow the MUSTS of this profile. They can only assume the behavior of 2560. |
2006-10-03
|
11 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Discuss by Ted Hardie |
2006-10-02
|
07 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-07.txt |
2006-08-04
|
11 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2006-08-03
|
11 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault |
2006-08-03
|
11 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko by Jari Arkko |
2006-08-02
|
11 | David Kessens | [Ballot comment] Comments received by Frank Kastenholz from the Ops Directorate: as this is a profile ('how to make it work') document, i'd make the … [Ballot comment] Comments received by Frank Kastenholz from the Ops Directorate: as this is a profile ('how to make it work') document, i'd make the same points that i made for draft-ietf-pki4ipsec-ikecert-profile-10.txt. one added question, section 1.1.1 of the document says that clients must use SHA1 to authenticate some data. Is it wise to mandate a crypto algorithm in this manner? given the history that shows that crypto-algorithms eventually weaken and then succumb to attacks of various forms, so won't sha1 also succumb? i don't know how to solve this problem; perhaps there should be an ietf-web-page someplace that shows the status of algorithms?xo |
2006-08-02
|
11 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2006-08-02
|
11 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings |
2006-08-02
|
11 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert |
2006-08-02
|
11 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu |
2006-07-31
|
11 | Ted Hardie | [Ballot discuss] I share some of Sam's concerns that this document appears to be making normative requirements that affect OCSP itself. My own reading is … [Ballot discuss] I share some of Sam's concerns that this document appears to be making normative requirements that affect OCSP itself. My own reading is that this text from the Introduction is the core of the issue: As OCSP does not have the means to signal responder capabilities within the protocol, clients need to rely on out of band mechanisms to determine when a responder operates according to this profile and, as such, when the requirements of this profile apply. I assume from this that every server and every client using this profile must, in fact, be a full-fledged OCSP responder or client, as they will have no way to determine in-band whether this profile is in use or not. If this not correct, then an applicability statement that describes when a restricted client or server may be deployed is in order. It's not entirely clear how much this behavior relies on both parties following the profile. In 1.1.2, the statement that a server MAY ignore a signature indicates, for example, that it may optimize its response processing in this way without regards to the client's wishes--as the client's inclusion of the signature is a moderately strong signal that it is not following the profile. If there are any cases where the client or server's failure to follow this spec should trigger a failover to default OCSP behavior, then it would probably be better to flag those; as it stands, it appears that each item in the profile is an incremental benefit in lightening the weight of OCSP and will not damage things if deployed alone. If that is *not* the case, clarifying text is needed. In section 1.2.4, the documents says: For the purposes of this profile, GeneralizedTime values such as thisUpdate, nextUpdate and producedAt MUST be expressed Greenwich Mean Time (Zulu) and MUST include seconds (i.e.,times are YYYYMMDDHHMMSSZ), even where the number of seconds is zero. The inclusion of the parenthetical time YYYMMDDHHMMSSZ is confusing, as it does not match either the examples or the HTTP date specified in Section 3.3 of RFC 2616. In section 4, the document says: The OCSP responder MUST support requests and responses over HTTP. When sending requests that are smaller than 255 bytes in total (after encoding) including the method (http://) That's not an HTTP Method, it is a URI scheme (http) and delimiters, used to introduce an authority section. "including the scheme and delimiters (http://)" would be appropriate. The length limit of 255 seems to run contrary to HTTP's design; why is not appropriate to follow the advice of Section 3.2.1 of RFC 2616: The HTTP protocol does not place any a priori limit on the length of a URI. Servers MUST be able to handle the URI of any resource they serve, and SHOULD be able to handle URIs of unbounded length if they provide GET-based forms that could generate such URIs. A server SHOULD return 414 (Request-URI Too Long) status if a URI is longer than the server can handle (see section 10.4.15). The older client implementations NOTED below in 3.2.1 don't seem to be a likely issue for anything capable of running this as profile; is the concern proxies? Is there any evidence of this as a problem in this environment? Would allowing Pragma: No-cache (an HTTP 1.0 directive) but not Cache-Control directives help eliminate the proxy problem? Section 2.2 appears to set behavior for when OCSP is invoked, rather than profile how OCSP is used. This does not seem to be actionable with the RFC 2119 language used. This seems to be more "good practice is to check what you can check locally before bothering the network/server". Am I misunderstanding the intent here? In Section 5.3, the document says: This functionality has been specified as an extension to the TLS [TLS] protocol in Section 3.6 [TLSEXT], but can be applied to any client-server protocol. It is not clear to me whether this is meant to apply on to aps running over TLS or any client server application. |
2006-07-31
|
11 | Ted Hardie | [Ballot Position Update] New position, Discuss, has been recorded for Ted Hardie by Ted Hardie |
2006-07-31
|
11 | Sam Hartman | [Ballot discuss] It's very confusing when an IETF working group publishes informational documents with a lot of normative requirements--particular documents that are related to existing … [Ballot discuss] It's very confusing when an IETF working group publishes informational documents with a lot of normative requirements--particular documents that are related to existing protocols. This document clearly can be published as a proposed standard if there is sufficient consensus: it has testable requirements and specifies protocol behavior. I think this document should be moved to the standards track if there is sufficient consensus. If there is not consensus to publish on the standards track then we should add some text to the draft explaining its relation to the OCSP protocol spec and explaining what reservations prevented us from publishing on the standards track. We would definitely need a statement saying that while the requirements of this profile are believed to be compatible with OCSP, the OCSP spec is definitive in case of conflict. I'm particularly concerned about two issues which seem to skirt the boundary of normative changes to OCSP itself. First, the handling of nonces seems to be close to normative. I could not find a direct conflict with the OCSP spec because it says so little about nonces. The requirement that servers need not check client signatures definitely seems like a normative change. While the validation of client requests is not covered in great depth, the strong common sense presumption is that client authentication should be verified when present. I have no problem with these if this document is on the standards track but am uncomfortable especially with the lack of signature checking as an informational document. |
2006-07-31
|
11 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter |
2006-07-31
|
11 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman |
2006-07-24
|
11 | Yoshiko Fong | IANA Last Call Comment: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2006-07-18
|
11 | Russ Housley | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Russ Housley |
2006-07-18
|
11 | Russ Housley | Placed on agenda for telechat - 2006-08-03 by Russ Housley |
2006-07-18
|
11 | Russ Housley | [Ballot Position Update] New position, Yes, has been recorded for Russ Housley |
2006-07-18
|
11 | Russ Housley | Ballot has been issued by Russ Housley |
2006-07-18
|
11 | Russ Housley | Created "Approve" ballot |
2006-07-17
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-07-17
|
06 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-06.txt |
2006-06-30
|
11 | Russ Housley | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Russ Housley |
2006-06-30
|
11 | Russ Housley | A revised I-D is needed to address the Last Call comments. The authors have been very responsive, so I expect the revised I-D to be … A revised I-D is needed to address the Last Call comments. The authors have been very responsive, so I expect the revised I-D to be posted soon. |
2006-06-29
|
11 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2006-06-15
|
11 | Michael Lee | State Changes to In Last Call from Last Call Requested by Michael Lee |
2006-06-14
|
11 | Russ Housley | State Changes to Last Call Requested from AD Evaluation by Russ Housley |
2006-06-14
|
11 | Russ Housley | Last Call was requested by Russ Housley |
2006-06-14
|
11 | Russ Housley | State Changes to AD Evaluation from Last Call Requested by Russ Housley |
2006-06-14
|
11 | Russ Housley | State Change Notice email list have been change to pkix-chairs@tools.ietf.org, alex@verisign.com, rmh@microsoft.com from pkix-chairs@tools.ietf.org |
2006-06-14
|
11 | Russ Housley | Last Call was requested by Russ Housley |
2006-06-14
|
11 | Russ Housley | State Changes to Last Call Requested from AD Evaluation by Russ Housley |
2006-06-14
|
11 | (System) | Ballot writeup text was added |
2006-06-14
|
11 | (System) | Last call text was added |
2006-06-14
|
11 | (System) | Ballot approval text was added |
2006-06-14
|
11 | Russ Housley | State Changes to AD Evaluation from Publication Requested by Russ Housley |
2006-06-14
|
11 | Russ Housley | State Change Notice email list have been change to pkix-chairs@tools.ietf.org, alex@verisign.com, rmh@microsoft.com from pkix-chairs@tools.ietf.org |
2006-05-23
|
11 | Russ Housley | Draft Added by Russ Housley in state Publication Requested |
2006-05-19
|
05 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-05.txt |
2006-03-29
|
04 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-04.txt |
2006-01-18
|
03 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-03.txt |
2005-07-18
|
02 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-02.txt |
2004-10-27
|
01 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-01.txt |
2004-10-01
|
00 | (System) | New version available: draft-ietf-pkix-lightweight-ocsp-profile-00.txt |