Server Lacks OCSP Stapling

raymond 1 Reputation point
2021-02-04T07:17:52.323+00:00

Export Target
https://login.microsoftonline.com/

Description
The affected servers do not return their SSL certificate's revocation status information via OCSP Stapling.

OCSP stapling is a feature that can be enabled in most web servers to provide clients (such as browsers or mobile Apps) connecting to the server over HTTPS with the information needed to ensure that the certificate has not been revoked. Certificates can be revoked for a variety of reasons, including the compromise of the SSL key or when a certificate was mistakenly issued. Giving HTTPS clients the ability to check for revocation can mitigate the impact of invalid or compromised certificates, in specific attack scenarios.

Additionally, Apple has mentioned OCSP Stapling as a security mechanism that should now be deployed on mobile endpoints, in the "Your Apps and Evolving Network Security Standards" session of the WWDC 2017 conference and the "What is New in Security" session of the WWDC 2016 conference:

"OCSP Stapling is a standard that has been out for a couple of years, but we think that now is the time for folks to actually move to it and start adopting it because support for it is now quite widespread."

This could imply that OCSP Stapling will eventually become a requirement for iOS Apps to be accepted on the App Store.

Recommendation
Update the affected mobile endpoints’ configuration to enable support for OCSP Stapling. Most modern web servers including Apache and nginx support stapling.

Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
8,931 questions
{count} votes

1 answer

Sort by: Most helpful
  1. MS-fan 1 Reputation point
    2021-04-14T06:49:51.357+00:00

    Any updates on this?

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.