Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CCADB's ICA list accuracy #14

Open
csosto-pk opened this issue Mar 17, 2022 · 2 comments
Open

CCADB's ICA list accuracy #14

csosto-pk opened this issue Mar 17, 2022 · 2 comments
Assignees
Labels
enhancement New feature or request question Further information is requested TODO

Comments

@csosto-pk
Copy link
Owner

csosto-pk commented Mar 17, 2022

If a 3rd party repo was hosting the ICA list for WebPKI, then we could limit outages because

  • all clients would have the same version (assuming within time interval).
  • servers could check if their ICAs are in the list (assuming within time interval) and if not they could just send them regardless of the flag (also discussed in Sending ICAs regardless (from Ryan S.) #7)

We should think about this more.

@csosto-pk csosto-pk added enhancement New feature or request question Further information is requested labels Mar 17, 2022
@csosto-pk csosto-pk self-assigned this Mar 23, 2022
@csosto-pk csosto-pk added the TODO label Mar 23, 2022
@csosto-pk
Copy link
Owner Author

@csosto-pk
Copy link
Owner Author

CCADB already hosts them here https://ccadb-public.secure.force.com/mozilla/MozillaIntermediateCertsCSVReport and we confirmed these are the same FiloSottile pulls from. So, there is a third-party that hosts them already.

Now we need to study how good this list is; meaning if the ICAs start getting used before they show up in the list.

@csosto-pk csosto-pk changed the title CCADB to host WebPKI ICA list CCADB's ICA list accuracy Jul 5, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request question Further information is requested TODO
Projects
None yet
Development

No branches or pull requests

1 participant