Closed
Bug 895375
Opened 11 years ago
Closed 10 years ago
Expired kuix.de blacklist test certificate
Categories
(NSS :: CA Certificates Code, task)
NSS
CA Certificates Code
Tracking
(Not tracked)
RESOLVED
FIXED
3.16.1
People
(Reporter: fweimer, Assigned: Cykesiopka)
Details
Attachments
(1 file)
12.30 KB,
patch
|
KaiE
:
review+
|
Details | Diff | Splinter Review |
The explicitly blacklisted certificate for kuix.de was once used for testing, but it's now expired, so it doesn't really test the blacklisting anymore. I think it should be removed from the default blacklist.
Updated•11 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Comment 1•11 years ago
|
||
The proposal makes sense, as this cert doesn't protect anyone.
Comment 2•11 years ago
|
||
I agree, but are there any automated tests that use this cert and will need to be updated?
Comment 3•11 years ago
|
||
Good point. I know we did manual testing, but I don't know if there are any automatic tests. Someone would have to research.
Severity: normal → minor
OS: Linux → All
Hardware: x86_64 → All
Version: 3.14.3 → trunk
Assignee | ||
Comment 4•10 years ago
|
||
all.sh passes with this patch applied and the following env vars on an Ubuntu 13.10 VM: USE_64=1 HOST=localhost DOMSUF=localdomain If this isn't enough, I can try investigating further.
Attachment #8395456 -
Flags: review?(kaie)
Comment 5•10 years ago
|
||
Comment on attachment 8395456 [details] [diff] [review] bug895375_v1.patch r=kaie
Attachment #8395456 -
Flags: review?(kaie) → review+
Comment 6•10 years ago
|
||
https://hg.mozilla.org/projects/nss/rev/dbf495bddd13
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.16.1
Assignee | ||
Updated•10 years ago
|
Assignee: nobody → cykesiopka.bmo
You need to log in
before you can comment on or make changes to this bug.
Description
•