TLS, the de facto standard protocol for securing communications over the
  Internet, relies on a hierarchy of certificates that bind names to public
  keys.
  Naturally, ensuring that the communicating parties are using only valid
  certificates is a necessary first step in order to benefit from the security of TLS.
  To this end, most certificates and clients support OCSP, a protocol for
  querying a certificate's revocation status and confirming that it is still valid.
Unfortunately, however, OCSP has been criticized for its slow performance, unreliability, soft-failures, and privacy issues. 
To address these issues, the OCSP Must-Staple certificate extension was
introduced, which requires web servers to provide OCSP responses to
clients during the TLS handshake, making revocation checks low-cost for clients.
Whether all of the players in the web's PKI are ready to support OCSP Must-Staple, however, remains still an open question.
In this paper, we take a broad look at the web's PKI and determine if all components involved---namely, certificate authorities, web server administrators, and web browsers---are ready to support OCSP Must-Staple.
We find that each component does not yet fully support OCSP Must-Staple: OCSP responders are still not fully reliable, and most major web browsers and web server implementations do not fully support OCSP Must-Staple.
On the bright side, only a few players need to take action to make it possible for web server administrators to begin relying on certificates with OCSP Must-Staple.
Thus, we believe a much wider deployment of OCSP Must-Staple is an realistic and achievable goal.
| Name (Vantage point) | Type | Size | SHA-256 Hash (Uncompressed) | 
|---|---|---|---|
| Oregon | Json (tar.xz) | 15 GB | 3bec837ec1a68c9e0dec86808dc7a4ee4d5360ef6ff95932ca06e41701f71406 | 
| Virginia | Json (tar.xz) | 15 GB | adeacad7321fee4394bdbaec639b9571940467f6049b4955e61431b83258d0ac | 
| Sao-Paulo | Json (tar.xz) | 15 GB | 2f9d4bd79f6797227de439cc50a4e00a0716979cb66ba580e0cd390ba1d566ab | 
| Paris | Json (tar.xz) | 15 GB | 3a6df50f0b06530569a28e5ad08ea7af239416dd15d3b026101c09c86c64f078 | 
| Sydney | Json (tar.xz) | 15 GB | ab1893406903b8298682340f5ee8054cb925835d422d1bec73044532a9e93abf | 
| Seoul | Json (tar.xz) | 15 GB | d522b6f1d888ed0655ba336b9ab1ae072972f35659987c84cf1dfadec36a2cd8 | 
Do you have any questions, comments or concern? Feel free to send us an email to Taejoong Chung