Gerv, have you read the current "security.OCSP.require in Firefox" thread on 
mozilla.dev.security?

Daniel Veditz said yesterday...
"An alternate approach I'd like to lobby our front-end guys on would be 
to put up a scary red bar when we can't validate OCSP. Users can still 
get to their sites so they won't ditch us for another browser, site 
owners are still getting traffic so they won't be breathing down _our_ 
neck (too much), but the site will look a little scary and link to an 
explanation so site owners can take the issue up with their CA and users 
have the opportunity to decide not to submit sensitive data over the 
connection."

This morning I suggested changing the boolean user pref of which you speak 
into 3 radio buttons:
"When an OCSP server connection fails:
  o   ignore the problem
  o   show a warning  (the new default)
  o   treat the certificate as invalid"

So rather than just "OK" and "Not OK", I'd like to see 3 categories:
1. OK.  Continue to download and display the webpage.
2. Maybe OK.  Display a warning message about problems with the response from, 
or problems accessing, the CA's OCSP Responder.  Continue to download and 
display the webpage.
3. Not OK.  Display a message that the certificate is revoked.  Block access 
to the webpage.

"Maybe OK" would be treated as "OK" if "ignore the problem" is selected, or 
as "Not OK" if "treat the certificate as invalid" is selected.

I would treat No Response, 400 response, 500 response and "tryLater" as "Maybe 
OK"s.

On Tuesday 13 October 2009 14:54:01 Gervase Markham wrote:
> Firefox uses OCSP but, by default, any response other than a definite
> "is revoked" response is treated as "is not revoked". There is a user
> pref that allows the user to change that, so that any response other
> than "is not revoked" is treated as "is revoked".
>
> IMO, we need to be smarter about that.
> Here's a straw man:
>
> OK:
> 200 response with OK
> No response (network problems)
>
> Not OK:
> 200 response with revocation
> 400 response (OCSP responder actively denying response)
> 500 response (OCSP responder broken)
>
> What do people think? Putting 400 and 500 in "not OK" makes it harder to
> inject a failure in order to get Firefox to pass a cert. Although one
> can still inject an OCSP tryLater <sigh>.
>
> Gerv

-- 
Rob Stradling
Senior Research & Development Scientist
C·O·M·O·D·O - Creating Trust Online
Office Tel: +44.(0)1274.730505
Office Fax: +44.(0)1274.730909
www.comodo.com

Comodo CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender by replying
to the e-mail containing this attachment. Replies to this email may be
monitored by Comodo for operational or business reasons. Whilst every
endeavour is taken to ensure that e-mails are free from viruses, no liability
can be accepted and the recipient is requested to use their own virus checking
software.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to