> On 5 Sep 2014, at 13:11, Phillip Hallam-Baker <[email protected]> wrote:
> 
>> On Fri, Sep 5, 2014 at 5:30 AM, Gervase Markham <[email protected]> wrote:
>>> On 04/09/14 14:25, Rob Stradling wrote:
>>> When attempting to access an HTTPS site with an expired cert on Firefox
>>> 32, you'll see a "This Connection is Untrusted" page that lets you add
>>> an exception and proceed.
>>> 
>>> But when attempting to access an HTTPS site with a revoked cert, you'll
>>> see "Secure Connection Failed" and Firefox 32 does NOT let you proceed.
>>> 
>>> Would it make sense to treat expired certs in the same way as revoked
>>> certs?  (And if not, why not?)
>> 
>> Logically, it does make sense. In practice, revocation has a near-zero
>> false-positive rate, whereas expired sadly has a much greater
>> false-positive rate. Which is why Firefox treats them differently.
> 
> Which means that expired short lived certs probably need to be treated
> differently.
> 
> We probably need to mark them in some way as being intended to be
> short lived.

Isn't a short lived cert categorised simply by its short validity?   If the 
platform will do something different based on a decision about the validity 
then that's already built in and needs no other indicator/OID/cert bytes. ;-)

> And we certainly need to fix the problem of getting them
> renewed efficiently.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to