Request – Transition Concerns What hash function / signature algorithm is the OCSP Responder permitted to use? If Request is signed, could expect the same on to be used by the OCSP Responder If Request is not signed, could expect the same hash function to be used, but there is no hint about the signature function Better if the Request listed the acceptable hash functions and signature algorithms |