Closed
Bug 1678378
Opened 5 years ago
Closed 5 years ago
CCADB entries generated 2020-11-19T17:00:53Z
Categories
(Core :: Security Block-lists, Allow-lists, and other State, enhancement)
Core
Security Block-lists, Allow-lists, and other State
Tracking
()
RESOLVED
FIXED
People
(Reporter: ccadb2onercl, Unassigned)
Details
Attachments
(4 files)
Adding entries to OneCRL based on revoked intermediate certificates reported in the CCADB.
| Reporter | ||
Comment 1•5 years ago
|
||
| Reporter | ||
Comment 2•5 years ago
|
||
| Reporter | ||
Comment 3•5 years ago
|
||
Comment 4•5 years ago
|
||
Comment 5•5 years ago
|
||
I confirm that these are the correct entries to add to OneCRL.
We shouldn't need to run TLS Canary on this set of changes, because these revocations happened a while ago and have already been added to other root store equivalents of OneCRL.
Comment 6•5 years ago
|
||
Approved at STAGE.
Comment 7•5 years ago
|
||
Approved at PROD.
Status: UNCONFIRMED → RESOLVED
Closed: 5 years ago
Resolution: --- → FIXED
Comment 8•4 years ago
|
||
Moving bug to Core::Security Block-lists, Allow-lists, and other State.
Component: Blocklist Policy Requests → Security Block-lists, Allow-lists, and other State
Product: Toolkit → Core
You need to log in
before you can comment on or make changes to this bug.
Description
•