Open
Bug 1953550
Opened 8 days ago
Updated 8 days ago
Disable OCSP fallback for in-program certificates that are not covered by CRLite when CRLite is in enforcement mode
Categories
(Core :: Security: PSM, enhancement, P3)
Core
Security: PSM
Tracking
()
ASSIGNED
People
(Reporter: jschanck, Assigned: jschanck)
References
(Blocks 1 open bug)
Details
Attachments
(1 file)
There are a few situations where the user's CRLite data may not cover a certificate that chains to our root store, e.g.
- the user has not yet downloaded CRLite filters, or
- the user's CRLite filters are out-of-date, or
- the certificate has been in CT for < 1 MMD interval.
If we're configured to enforce CRLite and tolerate OCSP soft failures, then it is reasonable to treat these as "CRLite soft failures" and skip OCSP fetching. Doing so will reduce the number of OCSP requests that we make for new profiles and profiles that have not been used recently.
Assignee | ||
Updated•8 days ago
|
Assignee: nobody → jschanck
Status: NEW → ASSIGNED
Assignee | ||
Comment 1•8 days ago
|
||
You need to log in
before you can comment on or make changes to this bug.
Description
•