On Tue, Apr 21, 2020 at 8:24 AM Wojtek Porczyk <[email protected]>
wrote:

> This statement, snipped from above:
>
> > This is exactly the sort of case CCADB is supremely positioned to solve,
> > efficiently. In fact, all of these problems can be addressed by CCADB
> > improvements, providing programmatically readable data while also making
> > use of efficiencies and economies of scale.
>
> makes me curious: do you think CCADB could be leveraged to provide such
> a list? To make it recommended (or even mandatory) to link to
> CCADB-provided
> query mechanism for such documents.


To support embedding?

No, the goal is to get stuff out, not add stuff. The CCADB absolutely could
be the place for CAs to disclose the base URL for such a service, and some
CAs already do approaches like this for providing supplemental details of
revocation not covered by CRLs/OCSP, but that information doesn’t need to
be conveyed in the certificate.

The goal here should be moving to a model closer to Secondary Certs or DANE
here, or the other drafts in IETF exploring compact certificate profiles,
albeit without the CBOR nonsense, in making sure only the essential
information is conveyed in band on every connection.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to