Interested in hearing some thoughts from the community on the use of OCSP vs CRL for certificate validation when using certificates for authentication/authorization on an anyconnect VPN.
I was thinking that
1)OCSP is theoretically more efficient/effective as you only query for validity of the cert you are looking at, and you get a real-time response as to its status whereas CRLs are cached so the data could be stale and you are getting an update from the CA of all revoked certificates which might be more than you need.....BUT....if its a relatively small implementation and/or there arent a ton of revoked certificates, maybe getting the entire CRL and cacheing it as opposed to using OCSP isnt that big of a deal.
2)CRL could have an advantage (maybe?) if your CA is not highly available or at least if you dont want your certificate based authentication to be dependent upon the availability of the CA.
One thing which I am factoring in here (and correct me if I am wrong on this) is that the ASA will only cache a CRL for a short period of time (trying to find the doc where I read this). If that is true...then issue 1 where OCSP has an advantage due to the "real time" nature of the information being used isnt that much of an advantage because the ASA is checking for CRLs so frequently. Also issue 2 where CRL has an advantage in the event of CA availability issues, isnt that much of an advantage since the ASA has to pull a new CRL so frequently that you are still dependent upon the CA's being available.
Your thoughts? What have you chosen to do and why?
We are happy to share changes to the Cisco Threat Grid support experience! Our customers have spoken, and we have listened! You want a single, streamlined, easy to access tool to open, view, and update your cases across Cisco Services. That tool is Cisco’...
Where can I find out how to integrate my Cisco products with Threat Response?
There are quick start guides and instructional videos to help you get set up with your Cisco products and the Cisco Threat Response platform.
Inviting all Security & Networking professionals! We want you to tell us what devices you use to do your work and its screen resolution. Your response will help us improve network and security management tools.
Click here to take the 5-minute s...
This guide is intended to show some nifty and powerful use cases that a lot of customers either want or don’t know they want. There are tons of other content out there for specific knobs or capabilities, but this is looking to be a more complete...