improve documenting of crl and ocsp
This commit is contained in:
parent
7c52bbde49
commit
47bdeaae86
1 changed files with 2 additions and 0 deletions
|
|
@ -201,6 +201,8 @@ defaultPref("security.ssl.treat_unsafe_negotiation_as_broken", true);
|
|||
/**
|
||||
* our strategy with revocation is to disable OCSP as it is slower and less privacy minded, and to use
|
||||
* CRL instead, particularly the CRLite solution with no OCSP fallback.
|
||||
* switching to crlite mode 3 (v99+) would allow us to detect false positive with OCSP. this would require
|
||||
* enabling OCSP and setting it to hard-fail. OCSP is stapled by default.
|
||||
*/
|
||||
defaultPref("security.OCSP.enabled", 0); // disable ocsp fetching
|
||||
defaultPref("security.remote_settings.crlite_filters.enabled", true);
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue