Closed
Bug 205436
Opened 22 years ago
Closed 16 years ago
Enhance NSS' OCSP client to talk to responders over HTTPS
Categories
(NSS :: Libraries, enhancement, P2)
Tracking
(Not tracked)
RESOLVED
WONTFIX
3.12.3
People
(Reporter: wtc, Assigned: wtc)
References
Details
It is useful to talk to an OCSP responder over HTTPS,
for example, for confidentiality reasons. Right now
NSS can only talk to an OCSP responder over HTTP.
This may require the support of the id-pkix-ocsp-nocheck
cert extension, whcih suppresses the revocation checking
of the responder's cert.
Updated•20 years ago
|
QA Contact: bishakhabanerjee → jason.m.reid
Updated•19 years ago
|
QA Contact: jason.m.reid → libraries
Comment 3•19 years ago
|
||
I reopened bug 92923 and reverted my change, I believe it's not a duplicate.
This bug is about supporting OCSP to https *within* NSS.
NSS has an internal http client, and might choose to enhance that to support
https.
Wan-Teh, you might choose to set this bug to WONTFIX, if you think the internal http client should no longer be enhanced, but people should rather solve the problem in the external http client provided by the application.
Updated•19 years ago
|
Summary: Support talking to an OCSP responder over HTTPS → Enhance NSS' OCSP client to talk to responders over HTTPS
Updated•18 years ago
|
Whiteboard: PKIX
Updated•18 years ago
|
Target Milestone: --- → 3.12
Updated•18 years ago
|
Priority: -- → P2
Target Milestone: 3.12 → 3.12.1
Comment 4•17 years ago
|
||
Removing pkix from whiteboard.
This bug is not specifically about libpkix.
It may be implemented as an enhancement to libpkix.
Whiteboard: PKIX
Assignee | ||
Comment 5•16 years ago
|
||
Marked the bug WONTFIX.
Status: NEW → RESOLVED
Closed: 16 years ago
Resolution: --- → WONTFIX
Target Milestone: 3.12.1 → 3.12.3
You need to log in
before you can comment on or make changes to this bug.
Description
•