Confirmed users, Administrators
5,526
edits
(removed the draft heading) |
(re-drafted OCSP section) |
||
Line 106: | Line 106: | ||
== OCSP == | == OCSP == | ||
When processing an [https://datatracker.ietf.org/doc/html/rfc6960#section-2.2 OCSP response], Firefox: | |||
* Rejects the OCSP response if it contains extensions that are marked critical | |||
* Does not process any OCSP extensions other than [https://datatracker.ietf.org/doc/html/rfc6962#section-3.3 1.3.6.1.4.1.11129.2.4.5 (SCT list)] | |||
* Ignores [https://datatracker.ietf.org/doc/html/rfc5280#section-5.3 CRL entry extensions] (if they are not marked critical) | |||
Mozilla: | |||
* Expects CAs to follow the [https://cabforum.org/baseline-requirements-documents/ BRs] | |||
* Does not expect [https://www.mozilla.org/projects/security/certs/policy/ Mozilla Root Store Policy] section 6.1.1, "End-Entity TLS Certificate CRLRevocation Reasons", to also apply to OCSP responses | |||
* Does not expect consistency between OCSP and CRL revocation reason codes for a certificate | |||
* | * Does not do anything special for an OCSP response indicating certificateHold | ||
* | |||
== Banned Revocation Reasons == | == Banned Revocation Reasons == |