Closed
Bug 1780845
Opened 3 years ago
Closed 3 years ago
CCADB entries generated 2022-07-22T17:00:56Z
Categories
(Core :: Security Block-lists, Allow-lists, and other State, enhancement)
Core
Security Block-lists, Allow-lists, and other State
Tracking
()
RESOLVED
FIXED
People
(Reporter: ccadb2onercl, Unassigned)
Details
Attachments
(4 files)
Adding entries to OneCRL based on revoked intermediate certificates reported in the CCADB.
Reporter | ||
Comment 1•3 years ago
|
||
Reporter | ||
Comment 2•3 years ago
|
||
Reporter | ||
Comment 3•3 years ago
|
||
Comment 4•3 years ago
|
||
These are the correct entries to add to OneCRL.
We do not need to run TLS Canary on this batch of changes.
Dana, Please proceed with approval at Kinto Staging.
Flags: needinfo?(dkeeler)
![]() |
||
Comment 6•3 years ago
|
||
Data in staging looks correct. Here's the output from onecrl-entry-checker.
Comment 7•3 years ago
|
||
Looks correct. Please proceed with approving the changes at Kinto Production.
![]() |
||
Comment 8•3 years ago
|
||
Approved in prod.
Comment 9•3 years ago
|
||
Thanks!
Status: UNCONFIRMED → RESOLVED
Closed: 3 years ago
Resolution: --- → FIXED
Comment 10•3 years ago
|
||
Verified in Firefox profiles. Thanks!
You need to log in
before you can comment on or make changes to this bug.
Description
•