Closed Bug 1839689 Opened 1 year ago Closed 11 months ago

CCADB entries generated 2023-06-21T17:00:51Z

Categories

(Core :: Security Block-lists, Allow-lists, and other State, enhancement)

enhancement
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: ccadb2onercl, Unassigned)

Details

Attachments

(4 files, 1 obsolete file)

Adding entries to OneCRL based on revoked intermediate certificates reported in the CCADB.

These are the correct entries to add to OneCRL.
We do not need to run TLS Canary on this batch of changes.

Dana, Please:

  1. Approve at Kinto Staging.
  2. Use remote-settings-devtools in a development profile to confirm the OneCRL data in Staging Nightly is as intended. (It may take a while for the changes to show up.)
  3. Run the onecrl-entry-checker tool and attach the output to this bug.
Flags: needinfo?(dkeeler)

Changes are still in review. The following bugs appear to require resolution.
https://bugzilla.mozilla.org/show_bug.cgi?id=1839689

Attached file compare.py output (obsolete) —
Flags: needinfo?(dkeeler)

Changes are still in review. The following bugs appear to require resolution.
https://bugzilla.mozilla.org/show_bug.cgi?id=1839689

Looks correct. Please proceed with approving the changes at Kinto Production.

Thanks, Dana!

Verified these changes in my Firefox Nightly and Release profiles.

Status: UNCONFIRMED → RESOLVED
Closed: 11 months ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: