If there was a DoS attack it would be the first and the last.

OCSP is only a DoS issue for servers that don't staple. All modern
servers can staple if configured to do so. Further it is only the
weaker CAs that don't have DoS proof OCSP service.

So if there was a DoS attack we would see a sudden upgrade to server
stapling and the OCSP service could probably be phased out after a
short time (except for feeding the cert holders with their tokens).



On Thu, Apr 24, 2014 at 12:39 AM, Daniel Micay <[email protected]> wrote:
> I'm talking about the DoS vulnerability opened up by making a few OCSP
> servers a single point of failure for *many* sites.
>
> It's also not great that you have to let certificate authorities know
> about your browsing habits.
>
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>



-- 
Website: http://hallambaker.com/
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to