On Feb 13, 11:58 am, Nelson B Bolyard <nel...@bolyard.me> wrote:
> Michael Ströder wrote, On 2009-02-10 00:27:
>
> > Nelson B Bolyard wrote:
> >> This is probably a policy question, but: are we willing to accept CAs
> >> that use CRLs that we cannot parse?
>
> > I'd say no.
>
> >> Does this CA also implement OCSP?  Can we justify this on the grounds
> >> that we do implement OCSP, and that OCSP will effectively displace CRLs
> >> as the preferred revocation channel?
>
> > I'd say no. Use of OCSP should not be made mandantory.
>
> No one has proposed anything that would make OCSP mandatory.
> At the present time, we support OCSP and "full" CRLs.
> We do not support "partitioned" CRLs.
> Very few CAs use partitioned CRLs.
>
> Support of partitioned CRLs is separate from support for CRLDP and
> fetching of CRLs from URLs in CRLDP extensions.  Support for One of
> those does not automatically imply support for the other.
>
> Recently, a CA that uses partitioned CRLs applied to admission to
> the Mozilla/NSS root CA list.  Our choices appear to be:
>
> 1) Do not admit their root until support for partitioned CRLs is done.
> (There is no active plan of record to do that work at this time.)
> 2) IF they also support OCSP, admit them on that basis
> 3) If not, admit their root anyway, knowing that their CRLs will not
> work with NSS, not even when CRLDP work is done.
>

Given that at present time, Mozilla supports OCSP and "full" CRL. If
supporting OCSP is one basis for admission of the CA root, should
there be a choice that 4) If the CA support "full" CRL, admit the CA
on that basis too.

> I think the last option is not a good choice.  I'm OK with either of
> the others.  The responses I've seen don't seem to clearly indicate
> which of the above 3 choices are acceptable.

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to