Stratus Security Guides - OSCP Stapling

All traffic on Mojo STRATUS goes through CloudFront which already has Online Certificate Status Protocol (OSCP) stapling enabled. Because of how this is implemented in CloudFront, OSCP may not show when tested.

According to Amazon Web Services:

When a viewer submits an HTTPS request for an object, either CloudFront or the viewer must confirm with the certificate authority (CA) that the SSL certificate for the domain has not been revoked. OCSP stapling speeds up certificate validation by allowing CloudFront to validate the certificate and to cache the response from the CA, so the client doesn’t need to validate the certificate directly with the CA.

The performance improvement of OCSP stapling is more pronounced when CloudFront receives numerous HTTPS requests for objects in the same domain. Each server in a CloudFront edge location must submit a separate validation request. When CloudFront receives a lot of HTTPS requests for the same domain, every server in the edge location soon has a response from the CA that it can “staple” to a packet in the SSL handshake; when the viewer is satisfied that the certificate is valid, CloudFront can serve the requested object. If your distribution doesn’t get much traffic in a CloudFront edge location, new requests are more likely to be directed to a server that hasn’t validated the certificate with the CA yet. In that case, the viewer separately performs the validation step and the CloudFront server serves the object. That CloudFront server also submits a validation request to the CA, so the next time it receives a request that includes the same domain name, it has a validation response from the CA.

Source: AWS Developer Guide


Last modified January 1, 0001