On 16/09/14 23:13, Richard Barnes wrote:
> From a browser perspective, I don't care at all whether certificates
> excused from containing revocation URLs if they're sufficiently short
> lived.  

>From a technical perspective, that is true. However, if we have an
interest in making short-lived certs a usable option, we have to
consider the ecosystem. CAs will have to do engineering work to issue
(and reissue) such certs every 24 hours, and sites will have to do
engineering work to request and deploy those certificates.

Whether those things are worth doing depends on the gain you get. If the
improved speed is only for a small population of browsers, it is
probably a lot less worth it than if it makes things faster for almost
everyone. The latter is only achievable if it's permitted to remove the
revocation pointers.

I can look at the validity interval and make a decision to
> check revocation or not, regardless of whether the OCSP URI is there
> or not.  In fact, a short-lived cert with an OCSP URI gets the
> benefit of added speed from browsers that suppress OCSP for
> short-lived certs, while at the same time working with legacy
> browsers.

A short-lived cert _without_ an OCSP URI also works with legacy
browsers. Unless you are using some other definition of "works"?

> So in units of Gerv's options below, the only action for Mozilla is
> (2).  

As I noted, "this would result in reduced take-up of the idea".

> We could do (0) in addition, or support similar efforts by CAs
> to get the BRs update to let them out of OCSP obligations for
> short-lived certs.  Honestly, I would prefer if CAs led, since
> they're the ones that benefit.

If this is something we want to be part of our revocation strategy, then
we benefit if we make it attractive to sites and CAs.

Gerv

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to