Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What happens if cert expires mid call ? #1318

Closed
stefhak opened this issue Jun 1, 2017 · 6 comments
Closed

What happens if cert expires mid call ? #1318

stefhak opened this issue Jun 1, 2017 · 6 comments
Assignees

Comments

@stefhak
Copy link
Contributor

stefhak commented Jun 1, 2017

From https://lists.w3.org/Archives/Public/public-webrtc/2016Sep/0071.html

Assigning to @martinthomson

@martinthomson
Copy link
Member

Answer: nothing. It's just too hard to worry about these things. Life is too short.

(FWIW, these little policy things are usually left to the endpoints to sort out. In HTTP-land, I don't think that anyone kills connection at this point, but they might and we probably will never see it outside of an artificial test. That test would be highly proprietary. That's because the rules by which a user agent determines that a certificate is "acceptable" vary considerably. There are some common things - a great many even - but the edges aren't always clear. I realize that this makes some people unhappy, but here's a free tip: don't let your certificates expire.)

@martinthomson
Copy link
Member

Oh, one thing that is important to note here: the certificate we have here is a bucket that contains a public key. The other trimmings - expiration time, subject, issuer, all that - is garbage, noise. Firefox doesn't check these, and nor should any other implementation. If you want to state that the only validity check on certificates is a=fingerprint, that would be a great big improvement and it would probably remove a ton of useless test cases from suites.

@stefhak
Copy link
Contributor Author

stefhak commented Jun 1, 2017

@fluffy any comment?
@martinthomson on #1318 (comment), do you think this is worthy of another Issue and PR? Can you do that?

@ekr
Copy link
Contributor

ekr commented Jun 1, 2017

Martin is right that nothing should happen. This is, btw, what happens with ordinarily WebPKI too

@martinthomson
Copy link
Member

@stefhak, that would more appropriately be a requirement on an IETF document (just as this issue would have been if it wasn't WONTFIX).

@stefhak
Copy link
Contributor Author

stefhak commented Jun 3, 2017

Thanks @ekr and @martinthomson, closing per your comments.

@stefhak stefhak closed this as completed Jun 3, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants