----- Original Message -----
> From: "Gervase Markham" <[email protected]>
> To: [email protected]
> Sent: Thursday, September 4, 2014 3:04:33 PM
> Subject: Re: Short-lived certs
> 
> On 04/09/14 12:52, Hubert Kario wrote:
> > It all depends on the exact definition of "short-lived". If the definition
> > is basically the same as for OCSP responses or shorter, then yes, they
> > provide the same security as regular certs with hard fail for OCSP
> > querying/stapling.
> 
> The exact definition of "short-lived" is something I want to declare out
> of scope for this particular discussion.
> 
> > I'm not sure what gives us the removal of revocation info from certificate.
> 
> Because there are lots of clients out there who check revocation info
> always if the pointers are present. The only way to stop them doing that
> (and so realise the speed advantage) is by not putting revocation info
> in the cert.

From what I heard (and my limited personal experience matches), is that
the vast majority of clients not only completely ignore failures in OCSP
retrieval (soft-fail) but completely lack any mechanism for revocation checking
(be it OCSP or CRL).

In fact, that is the main driver behind must-staple.

Can you provide examples to the contrary?

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Email: [email protected]
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to