Firefox does not check OCSP for any intermediate certificates except when verifying an extended validation certificate (note that third-party PKIs cannot issue certificates that Firefox will consider to be EV).
Firefox does not check CRLs at all.
OneCRL is a manually-curated list of revoked certificates from the web PKI, so it doesn't cover third-party PKIs. Short of hosting your own Remote Settings server (https://wiki.mozilla.org/Firefox/RemoteSettings) and including your revocations in your own version of OneCRL, there's no way to do what you're describing.

On 3/10/21 08:58, Martin Germann wrote:
I looks like Firefox is not checking intermediate CA certificates using OCSP
or CRL's. Found some sites saying that intermediate CA revocation
information is published using OneCRL (not sure if this information is
accurate).

That means that if I have an internal CA and would need to revoke an
intermediate CA certificate signed by my root CA, Firefox would never
notice. Any way to solve this?

Regards,

Martin



_______________________________________________
Enterprise mailing list
[email protected]
https://mail.mozilla.org/listinfo/enterprise

To unsubscribe from this list, please visit https://mail.mozilla.org/listinfo/enterprise 
or send an email to [email protected] with a subject of 
"unsubscribe"

_______________________________________________
Enterprise mailing list
[email protected]
https://mail.mozilla.org/listinfo/enterprise

To unsubscribe from this list, please visit https://mail.mozilla.org/listinfo/enterprise 
or send an email to [email protected] with a subject of 
"unsubscribe"

Reply via email to