In ideal world CA would want too put CSP doc in some utility that convert 
it to a linter or other way around: but not sure if it's something 
reasonable to make.

2025년 6월 6일 금요일 오전 6시 34분 50초 UTC+9에 Jeremy Rowley님이 작성:

> I've been thinking of this during the ongoing Microsoft incident, but is 
there a particular reason we lack an arbitrary maximum number of live 
certificates per intermediary? We lack actual hard figures on client 
limitations for CRL processing, CRP were pointing out active CRLs far 
exceeding the 10MB figure. A carve-out for short-lived certs, and planning 
from the worst-cast of a full revocation event what would be the ideal 
threshold for maximum number of certs? I'm not proposing this for BRs, or 
as a Root Program requirement - but certainly an option to minimize the 
blast radius for higher-level key compromise scenarios.

This has been proposed in the past but never adopted. IIRC it was because 
of the offline nature of key ceremonies so mass issuers would need to do a 
lot more signing. I still support this proposal though. You can batch up 
key ceremonies pretty easily.  

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/d9e47aae-9c60-4fbf-ab73-e4f9d2fd4b4cn%40mozilla.org.

Reply via email to