On Wed, May 13, 2020 at 9:00 PM Matt Palmer via dev-security-policy
wrote:
> On the contrary, unless there's an override of RFC5280 4.2.2.1 in the BRs
> that I can't find, the requirement of universal access does exist. RFC5280
> 4.2.2.1 says, in relevant part:
>
> "Where the information is
On Wed, May 13, 2020 at 08:28:03AM -0400, Ryan Sleevi wrote:
> On Tue, May 12, 2020 at 11:47 PM Matt Palmer via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
> > 1. As Hanno said, it's a public resource, and as such it should, in
> > general,
> > be available to the public.
On Tue, May 12, 2020 at 11:47 PM Matt Palmer via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:
> On Tue, May 12, 2020 at 11:37:23PM -0400, Ryan Sleevi wrote:
> > On Tue, May 12, 2020 at 10:30 PM Matt Palmer via dev-security-policy
> > wrote:
> > >
> > > On Tue, May 12, 2020
On Tue, May 12, 2020 at 11:37:23PM -0400, Ryan Sleevi wrote:
> On Tue, May 12, 2020 at 10:30 PM Matt Palmer via dev-security-policy
> wrote:
> >
> > On Tue, May 12, 2020 at 07:35:50AM +0200, Hanno Böck via
> > dev-security-policy wrote:
> > > After communicating with Microsoft it turns out this
On Tue, May 12, 2020 at 07:35:50AM +0200, Hanno Böck via dev-security-policy
wrote:
> After communicating with Microsoft it turns out this is due to user
> agent blocking, the URLs can be accessed, but not with a wget user
> agent.
> Microsoft informed me that "the wget agent is explicitly being
Hi,
On Mon, 11 May 2020 10:53:26 +0200
Hanno Böck via dev-security-policy
wrote:
> I did some checks on certificates and their AIA sections and noticed
> that several Microsoft certificates were referencing intermediate
> certificates in the "CA Issuer" field that give a 403 error.
>
>
I did some checks on certificates and their AIA sections and noticed
that several Microsoft certificates were referencing intermediate
certificates in the "CA Issuer" field that give a 403 error.
http://www.microsoft.com/pki/mscorp/Microsoft%20IT%20TLS%20CA%201.crt
7 matches
Mail list logo