Closed Bug 1670984 Opened 4 years ago Closed 4 years ago

Fix CRLite telemetry when encountering a stashed revocation

Categories

(Core :: Security: PSM, defect, P1)

defect

Tracking

()

RESOLVED FIXED
84 Branch
Tracking Status
firefox84 --- fixed

People

(Reporter: jcj, Assigned: keeler)

References

(Blocks 1 open bug)

Details

(Whiteboard: [psm-assigned])

Attachments

(1 file)

When a certificate is matched against a CRLite stash, we should change the telemetry result from valid to revoked. Right now, the state will be
mCRLiteTelemetryInfo->mLookupResult = CRLiteLookupResult::CertificateValid;

going into the mCertStorage->IsCertRevokedByStash and that state doesn't change upon a revoked result.

https://searchfox.org/mozilla-central/rev/803b368879fa332e8e2c1840bf1ec164f7ed2c32/security/certverifier/NSSCertDBTrustDomain.cpp#785-806

Assignee: nobody → dkeeler
Severity: -- → S3
Priority: -- → P1
Whiteboard: [psm-assigned]

Looking at the original data review (https://bug1488865.bmoattachments.org/attachment.cgi?id=9062379) I feel like it covers this addition. See in particular the CRLITE_QUERY_RESULT entry in the list of measurements. This (which got named CRLITE_RESULT when we landed it) represents the result of looking up a certificate in CRLite. Originally this didn't cover the case where the certificate was found to be revoked in the CRLite stash as opposed to the CRLite filter, but this patch fixes that.

Flags: needinfo?(chutten)

Reasoning's sound to me. Previous review covers the expansion.

Flags: needinfo?(chutten)
Pushed by dkeeler@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/11354a8db59b include CRLite stash revocation hits/library failures in CRLite telemetry r=jcj
Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → 84 Branch
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: