OCSP 服务已停止使用。
OCSP Service Has Reached End of Life

原始链接: https://letsencrypt.org/2025/08/06/ocsp-service-has-reached-end-of-life

Let’s Encrypt 已正式停止其在线证书状态协议 (OCSP) 服务,完全过渡到证书吊销列表 (CRL) 以获取证书吊销信息。 此变更于去年 12 月宣布,并已准备了 90 多天,其驱动因素是隐私问题。 OCSP 通过 IP 地址向证书颁发机构 (CA) 泄露网站访问信息,即使有意采取数据不保留策略,也可能存在潜在风险。 CRL 避免了此问题。 此举也简化了 Let’s Encrypt 的基础设施,释放了先前用于处理大量 OCSP 流量的显著资源——峰值达到每月 3400 亿次请求。 这使他们能够专注于核心运营并保持可靠性。 Let’s Encrypt 感谢 Akamai 十年来对 OCSP 服务的慷慨 CDN 支持。

## OCSP 服务终止与 Web PKI 讨论 Let's Encrypt 的 OCSP 服务即将终止,引发了关于证书撤销和 Web 安全复杂性的讨论。虽然 OCSP 提供了实时的证书状态,但它面临隐私问题和实施挑战(如响应者中断和可扩展性)。 像证书撤销列表 (CRL) 这样的替代方案并不完美,存在大小和传播问题。Mozilla 的 CRLite 旨在改进 CRL 处理,但许多人认为整个系统是一个“权宜之计”。短寿命证书(很快将最多为 47 天)被视为更好的长期解决方案,减少了对 OCSP/CRL 的依赖。 然而,强制执行诸如 OCSP stapling(服务器提供 OCSP 响应)之类的更改很困难,因为需要逐步部署并避免网站故障。Google Chrome 通过其自身的“CRLSets”——预下载的黑名单——绕过了这些问题。 这场讨论凸显了一种根本性的矛盾:在安全性和实用性之间取得平衡,并避免对庞大的 Web 生态系统造成破坏。一些人认为整个 CA 系统已经过时,而另一些人则指出证书透明度日志是关键的安全措施。
相关文章

原文

Today we turned off our Online Certificate Status Protocol (OCSP) service, as announced in December of last year. We stopped including OCSP URLs in our certificates more than 90 days ago, so all Let’s Encrypt certificates that contained OCSP URLs have now expired. Going forward, we will publish revocation information exclusively via Certificate Revocation Lists (CRLs).

We ended support for OCSP primarily because it represents a considerable risk to privacy on the Internet. When someone visits a website using a browser or other software that checks for certificate revocation via OCSP, the Certificate Authority (CA) operating the OCSP responder immediately becomes aware of which website is being visited from that visitor’s particular IP address. Even when a CA intentionally does not retain this information, as is the case with Let’s Encrypt, it could accidentally be retained or CAs could be legally compelled to collect it. CRLs do not have this issue.

We are also taking this step because keeping our CA infrastructure as simple as possible is critical for the continuity of compliance, reliability, and efficiency at Let’s Encrypt. For every year that we have existed, operating OCSP services has taken up considerable resources that can soon be better spent on other aspects of our operations. Now that we support CRLs, our OCSP service has become unnecessary.

At the height of our OCSP service’s traffic earlier this year, we handled approximately 340 billion OCSP requests per month. That’s more than 140,000 requests per second handled by our CDN, with 15,000 requests per second handled by our origin. We’d like to thank Akamai for generously donating CDN services for OCSP to Let’s Encrypt for the past ten years.

联系我们 contact @ memedata.com