Closed Bug 1670985 Opened 4 years ago Closed 4 years ago

Add a CRLite preference/mode to not evaluate OCSP

Categories

(Core :: Security: PSM, enhancement, P1)

enhancement

Tracking

()

RESOLVED FIXED
84 Branch
Tracking Status
firefox84 --- fixed

People

(Reporter: jcj, Assigned: keeler)

References

(Blocks 1 open bug)

Details

(Whiteboard: [psm-assigned])

Attachments

(1 file)

During testing, we've wanted to evaluate the speed of OCSP versus CRLite, but when we start to experiment with user-feel, we need to be able to halt revocation checks before OCSP fires, since we've gotten an authoritative answer from CRLite.

This bug is to add a preference to stop the revocation check if CRLite gave an authoritative answer, and not do OCSP or the OCSP/CRLite telemetry.

We'd want to stop after this block:

https://searchfox.org/mozilla-central/rev/803b368879fa332e8e2c1840bf1ec164f7ed2c32/security/certverifier/NSSCertDBTrustDomain.cpp#785-806

We could do this as another stage in the CRLite enum, or we could make "Enforcing" do it, or we could add a new preference that is just "crlite is authoritative." I think all have pros/cons.

Assignee: nobody → dkeeler
Severity: -- → N/A
Priority: -- → P1
Whiteboard: [psm-assigned]

When the CRLite mode is "enforce" and a certificate is found to be covered by
CRLite, this patch makes it so the implementation will not fall back to
processing OCSP (whether stapled, cached, or fetched). This also updates
test_crlite_filters.js to use a more recent, realistic filter and stash.

Pushed by dkeeler@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/09cb61c1b3ee don't fall back to OCSP when the CRLite mode is "enforce" r=jcj
Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → 84 Branch
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: