Intent to End OCSP Service
Let's Encrypt will discontinue OCSP in favor of CRLs to enhance privacy. This change won't affect website visitors but may impact non-browser software. Users relying on OCSP are advised to prepare for the transition.
Read original articleLet's Encrypt has announced its intention to discontinue the Online Certificate Status Protocol (OCSP) service in favor of Certificate Revocation Lists (CRLs) due to the latter's advantages. This change will not impact website visitors but may affect some non-browser software. The decision aims to enhance privacy on the internet by avoiding the immediate awareness of visited websites by Certificate Authorities (CAs) through OCSP. Let's Encrypt plans to end OCSP support to simplify its CA infrastructure, ensuring compliance, reliability, and efficiency. The move aligns with the CA/Browser Forum's decision to make OCSP services optional for trusted CAs. Let's Encrypt intends to provide a specific timeline for shutting down OCSP services once Microsoft Root Program also makes OCSP optional. Users relying on OCSP services are advised to prepare for this transition. Let's Encrypt, operated by the Internet Security Research Group (ISRG), encourages support through donations or sponsorship to promote a more secure and privacy-respecting web.
Related
More Memory Safety for Let's Encrypt: Deploying ntpd-rs
Let's Encrypt enhances memory safety with ntpd-rs, a secure NTP implementation, part of the Prossimo project. Transitioning to memory-safe alternatives aligns with broader security goals, supported by community and sponsorships.
Sustaining Digital Certificate Security – Entrust Certificate Distrust
Google's Chrome Security Team distrusts specific Entrust certificates due to reliability concerns. Chrome 127 onwards won't trust certain Entrust TLS server authentication certificates dated after October 31, 2024. Website operators should review certificates for compliance.
Chrome will distrust CA certificates from Entrust later this year
Google will stop trusting Entrust CA certificates from November 1, citing compliance failures. Websites using Entrust certs, like moneygram.com and ey.com, must switch to a new CA to avoid security warnings. Enterprise customers can still trust Entrust.
Entrust certificates will not be trusted in Chrome 127+
The Chrome Root Program Policy is updating trust for Entrust CAs due to compliance issues. Entrust must show improvement to maintain trust. Chrome will oversee changes to safeguard users and the web.
Letsencrypt Supports Wildcard Certificates
Let's Encrypt offers free SSL/TLS certificates for secure HTTPS connections, relying on donations. They issue Domain Validation and SAN certificates, recommend reporting malicious activities, and emphasize TLS/SSL security.
- Many users express confusion about the implications of this change for non-browser applications and the potential for slower revocation checks.
- There are calls for better support and standards for CRLs, with some suggesting alternatives like OCSP stapling or binary formats for CRLs.
- Users highlight the importance of privacy in certificate status checking and express disappointment over the perceived drawbacks of relying solely on CRLs.
- Some commenters seek clarification on how this change affects their specific setups, particularly with popular web servers like Nginx and Caddy.
- Overall, there is a sentiment of frustration regarding the complexity of the transition and its impact on certificate management.
CRLs can't be used to detect this, because they only list revoked certificates rather than providing a definitive status for every issued certificate.
I do wish the root programs had merely removed the requirement to include an OCSP URL in certificates, but required OCSP URLs for every issuer to be disclosed in the CCADB. That would have solved the privacy problems and made OCSP responders much cheaper to operate, while continuing to provide transparency into the status of certificates.
That will eliminate privacy concerns -- no compliant TLS implementation should fetch a OCSP ticket given a stapled response -- while still allowing for broad non-browser support.
Interesting to see Microsoft dragging here.
As far as I know, most browser vendors already download the CRLs, and then update the browsers based on what they downloaded. For instance firefox seems to be using CRLite. There is a lack of support for something like that in the non-major browsers and non-browsers. The alternative they have is to download the CRL instead of the OCSP reply, which is larger, probably making things slower. Or they could just not check the status, which is most likely what will happen.
CRLite changes the failure mode of the status check, it no longer just ignores error in downloading the status information.
We need better support for something like CRLite.
Afaik, NGINX and Apache only have OCSP stapling support.
Why isn't there a standard binary format for CRLs that is a cuckoo filter or a similar data structure? That way you don't have to worry about a CRL ballooning to gigabytes and you can expect clients to fetch the latest binary blob frequently.
Data is on CRL availability, number of entries, expiry & refresh times, etc. from various x509 leaf server SSL certificates.
[1] https://news.ycombinator.com/item?id=41058138 [2] https://news.ycombinator.com/item?id=41046956
Wasn't the point of OCSP to provide a low-latency and low-data alternative to CRLs, which might become massively huge?
First of all, privacy was one of the points of OCSP stapling.
Second, this breaks all non-http applications in the sense that they could previously work through OCSP stapling which would be communicated in-line. CRLs need to be fetched by the client, generally over HTTP.
Third, most non-browser TLS clients simply do not fetch CRLs, the implementation hurdle was too high.
… I'm left seriously befuddled by this decision by Let's Encrypt [edit: or rather the CA/B forum] :(
I have no idea if this means my setup will break even after consulting the docs of my ACME client.
Can I still use ACME Tiny[1] with nginx? Any reason to think that will break? How can I tell if I'm using OCSP or CRL?
Totally incomprehensible blog post.
Related
More Memory Safety for Let's Encrypt: Deploying ntpd-rs
Let's Encrypt enhances memory safety with ntpd-rs, a secure NTP implementation, part of the Prossimo project. Transitioning to memory-safe alternatives aligns with broader security goals, supported by community and sponsorships.
Sustaining Digital Certificate Security – Entrust Certificate Distrust
Google's Chrome Security Team distrusts specific Entrust certificates due to reliability concerns. Chrome 127 onwards won't trust certain Entrust TLS server authentication certificates dated after October 31, 2024. Website operators should review certificates for compliance.
Chrome will distrust CA certificates from Entrust later this year
Google will stop trusting Entrust CA certificates from November 1, citing compliance failures. Websites using Entrust certs, like moneygram.com and ey.com, must switch to a new CA to avoid security warnings. Enterprise customers can still trust Entrust.
Entrust certificates will not be trusted in Chrome 127+
The Chrome Root Program Policy is updating trust for Entrust CAs due to compliance issues. Entrust must show improvement to maintain trust. Chrome will oversee changes to safeguard users and the web.
Letsencrypt Supports Wildcard Certificates
Let's Encrypt offers free SSL/TLS certificates for secure HTTPS connections, relying on donations. They issue Domain Validation and SAN certificates, recommend reporting malicious activities, and emphasize TLS/SSL security.