Proceedings of the 2015 Internet Measurement Conference 2015
DOI: 10.1145/2815675.2815685
|View full text |Cite
|
Sign up to set email alerts
|

An End-to-End Measurement of Certificate Revocation in the Web's PKI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
80
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(83 citation statements)
references
References 17 publications
3
80
0
Order By: Relevance
“…Short-lived, multisigned certificates greatly reduce the need for a revocation system, but do not completely suppress it. Given that designing a satisfactory revocation system has proven to be an extremely challenging task [25,38,39], we consider it to go beyond the scope of this paper. Nevertheless, the security of BlockPKI can be further improved by combining it with any existing revocation scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Short-lived, multisigned certificates greatly reduce the need for a revocation system, but do not completely suppress it. Given that designing a satisfactory revocation system has proven to be an extremely challenging task [25,38,39], we consider it to go beyond the scope of this paper. Nevertheless, the security of BlockPKI can be further improved by combining it with any existing revocation scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Even though use of CRLs is limited to revoking certificates, rather than allowing for more complex updates, their size, which is linear in the number of revocations, can become quite large. The median certificate has a revocation list on the order of 50 KB, and CRLs of several megabytes are not uncommon [1]. We saw in Section XII that the amount of information required to verify the status of a user's identity against an up-to-date r IV,t is logarithmic in the number of IV s users, on the order of 1 KB.…”
Section: Comparison Of Revocation Mechanism Tomentioning
confidence: 99%
“…Moreover, as shown in [1], a number of widely used, modern browsers accept revoked certificates in certain circumstances. In contrast, note that our update mechanism is integrated into the issuing system so that checking that a record is up-to-date is done in the same process as checking that that record exists at all.…”
Section: Comparison Of Revocation Mechanism Tomentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, the deployment and effectiveness of this technique depend on the server configuration (e.g., the age of a stapled response can be customized by a configuration parameter, which may introduce a long attack window). Liu et al reported [29] that only 3% of certificates are served by servers supporting OCSP Stapling. Moreover, OCSP and OCSP Stapling only return the status of a single certificate (not the entire chain).…”
Section: The Evolution Of Revocation Schemes and Their Drawbacksmentioning
confidence: 99%