[21] OCSP は、証明書の失効の有無を確認するためのプロトコルです。
[1] RFC 6960 - X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP ( 版) http://tools.ietf.org/html/rfc6960
[2] ImperialViolet - Revocation checking and Chrome's CRL (Adam Langley 著, 版) https://www.imperialviolet.org/2012/02/05/crlsets.html
[3] Online Certificate Status Protocol - Wikipedia ( 版) http://ja.wikipedia.org/wiki/Online_Certificate_Status_Protocol
[4] CA:ImprovingRevocation - MozillaWiki ( 版) https://wiki.mozilla.org/CA:ImprovingRevocation
[5] Revoking Intermediate Certificates: Introducing OneCRL | Mozilla Security Blog ( 版) https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
[7] 157555 – OCSP tracking bug ( 版) https://bugzilla.mozilla.org/show_bug.cgi?id=157555
[9] ImperialViolet - No, don't enable revocation checking ( (Adam Langley著, )) https://www.imperialviolet.org/2014/04/19/revchecking.html
[34] Chromeは既定だとオンラインで証明書の失効確認していないので設定方法を調べてみた - piyolog ( 版) http://d.hatena.ne.jp/Kango/20140413/1397345642
[12] Issue 361820 - chromium - Check For Server Certificate Revocation checkbox is confusing - Monorail ( ()) https://bugs.chromium.org/p/chromium/issues/detail?id=361820
[13] Certificate revocation and the performance of OCSP | Netcraft ( ()) http://news.netcraft.com/archives/2013/04/16/certificate-revocation-and-the-performance-of-ocsp.html
[15] 991815 – (mozilla::pkix) Sites not getting EV treatment with mozilla::pkix is on, but do get EV treatment when mozilla::pkix is off because OCSP response is old ( ()) https://bugzilla.mozilla.org/show_bug.cgi?id=991815
[16] OpenSSL ( (OpenSSL Foundation, Inc.著, )) https://www.openssl.org/docs/manmaster/crypto/OCSP_sendreq_new.html
[17] OpenSSL ( (OpenSSL Foundation, Inc.著, )) https://www.openssl.org/docs/manmaster/crypto/OCSP_response_status.html
[18] OpenSSL: how to setup an OCSP server for checking third-party certificates? - Server Fault ( ()) http://serverfault.com/questions/131983/openssl-how-to-setup-an-ocsp-server-for-checking-third-party-certificates
[19] OpenSSL ( (OpenSSL Foundation, Inc.著, )) https://www.openssl.org/docs/manmaster/apps/ocsp.html
[23] RFC 4557 - Online Certificate Status Protocol (OCSP) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) () https://tools.ietf.org/html/rfc4557
[24] Only specific APIs should skip the fetch event when called within a service worker · Issue #303 · whatwg/fetch () https://github.com/whatwg/fetch/issues/303
[25] Document CORS safelist exceptions (estark37著, ) https://github.com/whatwg/fetch/commit/860ab8669fb3775b77b6f81e44e5a2609db0bc93
[26] High-reliability OCSP stapling and why it matters () https://blog.cloudflare.com/high-reliability-ocsp-stapling/
[27] OCSP / SCT requirements of the cert-chain · Issue #175 · WICG/webpackage () https://github.com/WICG/webpackage/issues/175
[28] Hiroto KagotaniさんはTwitterを使っています 「Firefoxでhttps://t.co/pgV94qaO88を開こうとするとMOZILLA_PKIX_ERROR_OCSP_RESPONSE_FOR_CERT_MISSINGのエラーコードでSecure Connection Failedになるのは、FirefoxがOCSPのハッシュアルゴリズムとしてSHA-2をサポートするのを8年サボったせい。 https://t.co/ZUyjUL8FOc」 / Twitter (, ) https://twitter.com/HirotoKagotani/status/1470666048248872961
[29] 966856 - Add SHA-2 support to mozilla::pkix's OCSP implementation () https://bugzilla.mozilla.org/show_bug.cgi?id=966856
[32] RFC 4557: Online Certificate Status Protocol (OCSP) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT), https://www.rfc-editor.org/rfc/rfc4557.html
[33] RFC Errata Report » RFC Editor, https://www.rfc-editor.org/errata/rfc4557
[35] specifications/ocsp-support.rst at master · mongodb/specifications · GitHub, https://github.com/mongodb/specifications/blob/master/source/ocsp-support/ocsp-support.rst