Kathleen Wilson wrote:
> In the case of EV certs, Mozilla is still checking the CRL when the OCSP URI
> is not provided.

Which CRL? Where does it come from?

> Though, I believe the plan is to stop checking CRL in the
> future...
> https://bugzilla.mozilla.org/show_bug.cgi?id=585122#c34
> "Instead of checking explicitly for an OCSP responder URI in the AIA
> extension, let's simply remove the support for downloading CRLs from Firefox's
> EV checking. That will have the effect of enforcing that all certs in the
> chain have an OCSP AIA extension, except possibly for the end-entity
> certificate if the server stapled the end-entity OCSP response. I agree with
> the CA representatives that a missing OCSP AIA URL isn't harmful when a
> stapled OCSP response is provided. So, I am OK with allowing that exception,
> at least for now."

Anyone writing such a non-sense surely is on NSA's payroll.

Ciao, Michael.

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to