Podcast
Root Causes 94: Revocation Checking Through OCSP and CRL


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
May 26, 2020
One essential portion of the certificate lifecycle is the ability to revoke certificates. Public SSL certificates use a pair of mechanisms to communicate this revocation status to client machines, CRL and OCSP. In this episode we explain how these mechanisms work and some of their strengths and challenges.
Podcast Transcript
Lightly edited for flow and brevity.
Let's look at the scenario where I do steal a key. So, I say I'm a sophisticated attacker. I steal a key. I hijack your DNS. I send you off to my fake website, that looks like the real website, including the URL. I stick your certificate on there. Right? Now, the problem with that at this point is that if that certificate - - so, the owner of the certificate finds out that this has happened. The owner of certificate revokes the cert. Now, if my captive audience that I've stolen their DNS comes to my site and they go off and they check for certificate revocation once I own your machine anyway, I can arrange for that OCSP response not to come back. And under those circumstances, if the software fails soft, then it says, okay, let's proceed, which means that in the exact scenario that the system is built to defend against, that is the scenario where the system ops not to work. So, it’s equivalent to a seatbelt that breaks when you get in an accident. Why bother? I wear my seatbelt and my seatbelts there across my chest and everything's fine all the time while I'm driving around but the instant that I get into an accident, the seatbelt breaks and offers me no protection, on the one occasion that I need it. And that is - - that's the scenario we just described with OCSP.

