Closed Bug 1691771 Opened 10 months ago Closed 10 months ago

CCADB entries generated 2021-02-09T17:00:43Z

Categories

(Core :: Security Block-lists, Allow-lists, and other State, enhancement)

enhancement
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: ccadb2onercl, Assigned: kwilson)

Details

Attachments

(4 files)

Adding entries to OneCRL based on revoked intermediate certificates reported in the CCADB.

Comment on attachment 9202079 [details]
Line delimited issuer/serial pairs

I confirm that these are the correct entries to add to OneCRL.

Attachment #9202079 - Flags: review+
Attachment #9202080 - Flags: review+
Attachment #9202081 - Flags: review+
Assignee: nobody → kwilson
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true

Visual inspection of Kinto Staging and Production checks out too.

We do not need to run TLS Canary on this batch.

Dana, Please proceed with onecrl-entry-checker and then approving the changes at Kinto Staging and Production when you are ready. Thanks!

Dana has approved at Kinto Staging and Production. Thanks!

I confirm that these new OneCRL entries are now in my Nightly and Release Firefox profiles.

Status: ASSIGNED → RESOLVED
Closed: 10 months ago
Resolution: --- → FIXED

Moving bug to Core::Security Block-lists, Allow-lists, and other State.

Component: Blocklist Policy Requests → Security Block-lists, Allow-lists, and other State
Product: Toolkit → Core
You need to log in before you can comment on or make changes to this bug.