On 04/10/16 19:39, Peter Bowen wrote:
> On Tue, Oct 4, 2016 at 6:29 AM, Rob Stradling <[email protected]> 
> wrote:
>> On 04/10/16 13:18, Nick Lamb wrote:
>>> On Tuesday, 4 October 2016 11:14:01 UTC+1, Rob Stradling  wrote:
>>>> Neither.  I'd like to run cablint over all certs pre-issuance, but
>>>> unfortunately it's not practical to do this yet because 1) cablint is
>>>> too slow and 2) there are some differences of opinion that have been
>>>> discussed at CABForum but not yet resolved.
>>>
>>> Can you expand on what "too slow" would mean here? Or does it tread too 
>>> much on specific commercial performance criteria you don't want to talk 
>>> about?
>>
>> Running cablint means firing up the Ruby interpreter, then fork/exec'ing
>> a separate executable umpteen times.  IIRC, last time I checked, crt.sh
>> was only managing to cablint ~10 certs per second.  (Prior to that,
>> before I'd figured out a way to avoid having to take the "firing up the
>> Ruby interpreter" hit again and again for every single cert, it was only
>> managing to cablint ~3 certs per second).
> 
> cablint could be much faster if the asn1 code could be moved in
> process.  Doing so requires someone who can work in C and has some
> experience building Ruby extensions.  This change would avoid the many
> many fork/exec calls during a single certificate lint.
> 
> If anyone is willing to volunteer, I can provide more detail.

Woo!  Matt Palmer accepted the challenge...

https://github.com/awslabs/certlint/pull/38

-- 
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to