Podcast
Root Causes 281: Google Proposes Optional OCSP


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 27, 2023
In response to concerns about OCSP and privacy, Google has proposed removing the requirement for OCSP revocation checking for public SSL certificates meeting certain specific conditions. In this episode we go into the details of this proposal.
Podcast Transcript
Lightly edited for flow and brevity.
And so, first of all, thank you, Ryan, for making that available to the listeners so readily and easily. But, secondly, we thought, wow, this is great. Let’s follow up and let’s discuss this proposal in detail. So, I think that’s what we are going to do today.
So, the first thing probably to emphasize is it is not a proposal that we make OCSP illegal or eliminate OCSP or force CAs not to use OCSP. It is merely a proposal that says for certain certificates that meet the specific conditions that will be specified, which is they’re short-lived – and we will get into what that means – then OCSP responders are no longer required. So, one consequence of that would be if a CA wanted to have short-lived and long-lived certs both, then that CA would never really be truly free of OCSP. They would just be able to reduce the scope of what they need to provide OCSP for, which might still have benefits and it might be great. But that’s the first thing to bear in mind. It’s not a requirement that people move off of OCSP entirely. Rather, it’s an option that’s available to the CA and available to the subscriber. The certificate consumer who is going to use that certificate. So, that’s a very important point.
And the conditions under which the CA is allowed to issue certificates that no longer require OCSP responses, the main one is, as I said, short-lived. And the definition of short-lived here is not longer than ten days. So, if I want to issue you a one-day cert or a one-hour cert or a five-day cert or a nine-day cert, or a ten-day cert, that’s fine according to this proposal. As soon as I issue you an 11-day cert, however, that is not ok and that will require revocation checking. And, of course, the maximum duration would not change. At present it is 398 days according to CA/Browser Forum rules and, perhaps in the future that will go down. You and I have discussed and speculated that in the past and under those circumstances, that maximum day would be shortened but either way, that is a separate consideration separate and apart from this ten-day maximum for which a non-OCSP certificate is allowed.
And then the second thing that’s connected to that is if you are subscriber and you would like to preserve the privacy of anyone who is connecting to your server then you can do that. You have an option. You go to a short-lived certificate automated scenario where you are updating your certificate every week or ten days or whatever it is and as a consequence, no more OCSP will be served on that and therefore, you have the benefit of preserving that privacy for the subscriber. So that becomes a motivator on that side as well.
So, if you look at these two things in conjunction, you see it is raising the motivation at least to some degree across the ecosystem for more adoption of short-lived certs than there would have been otherwise.
If you think about just the OCSP in general. You’ve got the individual’s browsing history and the concerns about privacy regarding that are due to perhaps two things. One being the fact that logs can be breached which would then give you an idea of what the user was actually looking at. And then, of course, there is the other concern which is interesting in the industry. A lot of us don’t think about it for ourselves but it does have to do with things like subpoena. In other words, the logs exist therefore they can be subpoenaed out by law and your records are out there somewhere.
And then, of course, the other motivation for the CAs, very specifically, is there is a lot of cost associated with doing OCSP responses. So if you think about it all around and if you include just what you just said about the fact that the website servers, the people who are actually handing out the websites also can then say, hey, I am protecting your privacy by using short-lived certificates. That’s pretty in the weeds. I don’t know if anybody would ever advertise that but it may just be. You never know. I think if you look all the way around to all those three main players in the simple web browser to web server relationship that also includes the CAs themselves, everybody wins by going to the short-lived certificates and getting away from revocation in total.
So, there’s a lot of motivation and that’s why I think it’s a good proposal. It’s a good bridge proposal into the future is force anybody to anything. But I can see the writing on the wall and because the motivations are positive on all sides, I can see this eventually happening.
The other main requirement here is that the CA must have very, very current CRLs, which is to say they must be issued daily or more frequently. So, there’s always a current CRL available since that basically is going to become our surrogate for OCSP. So, you need to have that available daily or more frequently. And daily, of course, is an interesting timing because for different kinds of events with certificates, there are different periods of mandatory maximum revocation time. So, depending on the nature of the problem with the certificate you can have revocation times of different time periods. The most common one is a five-day revocation period. So, once the CA become aware of a certain kind of problem with a certificate, typically there are up to five days. 96 hours to revoke the certificate. However, sometimes you run into a different kind of requirement and you get a one-day, a 24-hour, revocation period.
So, that one day is significant. One day, 24 hours. So, if the CRL is being issued daily then there is daily revocation information available. So in the event I do have to revoke one of these ten-day certificates, every day the revocation information becomes available. At least in principle. And so, that would be point number one.
And then the other point that’s very important is Google does point out in their, their paper here, that it is not necessary that the complete CRL is published daily concluding all certificates, rather you can what they call shard your CRL. You can break it up in various ways into smaller pieces and there are no real dictates around how you would shard it. So, you could in principle, shard it quite a bit. And I could imagine having a very sharded CRL strategy so that the CRLs are not themselves prohibitively large and the cost of serving those CRLs does not itself wind up being equally expensive as performing OCSP. Which would eliminate one of those benefits. So, to the degree that CAs can be smart about how they shard their CRLs and automate that whole process and issue those every day, then that is an essential part of making this whole thing work. So, that’s the other main thing.
And then probably the last thing to be aware of is, according to this proposal, which is not gone about or anything, so this isn’t coming as a sure thing, but it is an important player, who made this proposal. According to this proposal, the effective date would be January 15, 2024. So, a little over a year from now. And I think what that would do is that would give everybody else in the industry time to catch up because this is a pretty big deal. If you are gonna stop offering OCSP for your ten-day certs but you are gonna offer them for your longer certs and you are gonna do something with your CRLs about it and blah, blah, blah. Like there’s some non-trivial process and engineering work that is required here for a CA to be able to honor this. So, they’ve put some time in while everybody works on that. And that’s a common practice with major significant important proposals in the CA/Browser Forum is there’s usually some time of time gap to give the CAs an opportunity to catch up.
So hypothetically, if you are a CA and you wanted to completely and utterly shut down OCSP, you wanted to go dump a bucket of water on that server, what you would have to do is you would have to wait until the last of your certificates that was more than ten days in term had expired and at that point and only at that point would you be able to go and pull the plug on that thing and shut off the red light. And I imagine what would be a more likely scenario would be that CAs would continue to offer OCSP because it would be a hard thing to turn around and declare that 100% of your subscribers had to suddenly go to short-lived certificates. Because some may not want to. And so probably in the real world in terms of a commercial CA probably what you would see is you would see a reduction in time or a reduction in the size of the footprint of what needed to be done with OCSP as some portion of your certificates moved to these short-lived sub ten-day certificate lifespans.
The only reason I can come up with is what you just said – people who may not want to go to ten-day certs. Well, who are those people? And I bet you those are the folks who are on spreadsheets managing their certs.
Then you get basically owned CAs. CAs that are owned only for the use of the company that is actually the CA and, in particular, I’m thinking of AWS and Amazon Trust Services, Google Cloud Platform and Google Trust Services. And in both of these cases these are public CAs that do not give any certificates to anyone but themselves and they run them entirely in an automated fashion inside of their large robust public cloud agile platforms and you could easily imagine those services saying I’m gonna go to ten-days or less and once again, I’m just gonna shut down the OCSP service in its entirety.
So, there are lots of places in the ecosystem where this is very viable. There are entire Certificate Authorities who can probably walk away from OCSP entirely in not a hugely long time period. A little over a year. Then there are people like Sectigo that serve a very broad set of users and use cases and under those circumstances, as long as some of those users for whatever reason do not want to go ten-days certs – which is probably to your point, Jay – because they are not automated, then they are gonna be stuck with OCSP and that means that the CAs who want to serve them will also be stuck with OCSP for at least a subset of their active certificates. And that will probably linger.
No matter how much you and I tell the automation story, there are plenty of people who don’t hear that story or don’t absorb it or don’t prioritize it. And we bump into these people over and over and over again in our jobs. So, we know that that’s gonna be a long path. However, whatever it is, a 1,000-mile journey starts with a single step. So, this is great. This is a step and we get going and the more steps like this occur the more it will help the whole world move in this direction.
In a CRL scenario, then everybody knows in upwards of 24 hours depending on when that CRL was published and in the event that software support for CRL is imperfect, which is a question that Google raises, possibly longer including for the full duration of the cert. Now granted, the attack surface for that or the risk aperture for that goes down to ten days, which is much less than 398 days. Nonetheless, it is still much more than one day. And so, that would be as far as there is a down side, I think that would be the single sole downside. However, it’s easy to imagine you say, well, loss of key or DCV failure or the other things that require a one-day revocation are exceedingly rare and in the event that they happen, the risk aperture is still at only ten days and we believe that it is a net positive for the overall health and security of the ecosystem by protecting privacy and getting these other benefits. And that would be the argument. I think that would be a credible argument. I think that that’s something we could debate but you can’t at least dismiss that argument off-hand – out of hand. And so, that will probably be discussed. I’m certain that will be discussed in a number of places by a number of people and for a ballot like that to pass, the community as a whole is gonna have to get comfortable with that argument. But I think they will and I’m predicting that at the end of the day this is something that everybody will feel good about and will actually pass a ballot and then CAs and supporting ecosystem will all start driving toward being able to work in this new world order.
And so, I don’t think anybody is denying the fact that a perfect world would include a revocation check. But in some ways, sometimes it’s just too expensive or it’s not possible at all and it’s better to just have the certificate environment in general just functioning as is without it.
In both public and private trust scenarios.
It’s just – it’s good. It’s good all the way around. And I’ll tell ya, in a world where we very well may need crypto agility in other words, to be able to reissue certificates very quickly especially with the quantum apocalypse coming, who knows what may happen with RSA one day even before quantum. Who knows? I just think shorter-lived certificates just make a lot of sense in a lot of ways.
Great. That’s my job. Alright. Well, I think that’s probably it for this topic. We will continue to track this. There will be more coming on this topic I’m quite confident, and we will come back and we will tell you as it happens.

