-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OT: OCSP and CRL #1063
Comments
I'm not sure what you want me to do? https://scotthelme.co.uk/revocation-checking-is-pointless/ ... "the purposes of this blog post is to demonstrate that revocation checking really is pointless as it currently stands" .. "One of the biggest problems with existing revocation mechanisms is their soft-fail nature" (emphasis in both = mine) ... and then he shows just that, by blocking at a network level via PiHole We don't soft-fail user_pref("security.OCSP.require", true); FYI: Jan 2020 : https://blog.mozilla.org/security/2020/01/21/crlite-part-3-speeding-up-secure-browsing/ - pretty sure FF is using this by default by now
https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol#Comparison_to_CRLs
As stated in 1211, "It's a trade-off between security (checking) and privacy (leaking info to the CA)". And it looks as if that thread is suggesting to disable all checking The question you should be asking is if Firefox uses secure connections with CAs. IDK the answer, but I would assume that browsers use as much encryption as possible. At the end of the day, either turn the thing off and compromise security (the risk might be super low, but it is a risk), or use what is currently available in the best config you have |
Thank you @Thorin-Oakenpants, not only for this commenting but overall. ❤️ U p.s. Close issue it at your will. |
At least with LetsEncrypt and Google, Firefox uses port 80 with In my opinion a better option than blocking OCSP (and thus decreasing security and risking giving credentials to revoked certificate compromising privacy) would be having a browser extension or similar to tell whether website is using OCSP stapling or not and then asking the administrators if they could enable the OCSP stapling. While it wouldn't resolve the issue entirely, it would decrease connections made to the CA. I am coming from following nextdns/metadata#470 where my comment may be more relevant, but I think it would be too weird to reply to a question here there. |
fyi: #1065 |
@Thorin-Oakenpants and @earthlng
Hey guys. This is OT, but I value your opinion mountain high.
Could you be so kind and comment this topic here:
https://github.com/nextdns/metadata/issues/470
Thank you and cheers
The text was updated successfully, but these errors were encountered: