improve documenting of crl and ocsp
This commit is contained in:
parent
7c52bbde49
commit
47bdeaae86
1 changed files with 2 additions and 0 deletions
|
|
@ -201,6 +201,8 @@ defaultPref("security.ssl.treat_unsafe_negotiation_as_broken", true);
|
||||||
/**
|
/**
|
||||||
* our strategy with revocation is to disable OCSP as it is slower and less privacy minded, and to use
|
* our strategy with revocation is to disable OCSP as it is slower and less privacy minded, and to use
|
||||||
* CRL instead, particularly the CRLite solution with no OCSP fallback.
|
* CRL instead, particularly the CRLite solution with no OCSP fallback.
|
||||||
|
* switching to crlite mode 3 (v99+) would allow us to detect false positive with OCSP. this would require
|
||||||
|
* enabling OCSP and setting it to hard-fail. OCSP is stapled by default.
|
||||||
*/
|
*/
|
||||||
defaultPref("security.OCSP.enabled", 0); // disable ocsp fetching
|
defaultPref("security.OCSP.enabled", 0); // disable ocsp fetching
|
||||||
defaultPref("security.remote_settings.crlite_filters.enabled", true);
|
defaultPref("security.remote_settings.crlite_filters.enabled", true);
|
||||||
|
|
|
||||||
Loading…
Add table
Reference in a new issue