On 2017-07-12 16:12, Ryan Sleevi wrote:
I don't know if this currently happens, but I would like to see all CA
certificates that are in OneCRL but are not revoked to be added to the root
store as distrusted too.


Why? I can share reasons why it might not be desirable, but rather than
start out negatively, I was hoping you could expand upon the reasons for
including.

My understanding is that certdata.txt is what is the trust of the root store is, and that OneCRL is mostly a browser only thing to get revocation information, but is also (ab)used to distrust something.

The certdata.txt currently does explicitly list CA certificates that shouldn't be trusted.

As far as I know external user of the trust information currently only use certdata.txt. So only adding it to OneCRL will not reach all the users of the trust store.

It could be that maybe the combination is what should be used, but as far as I know it's not documented as such and I doubt it gets used much outside Mozilla products.


Kurt
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to