You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now that Microsoft has relaxed its policy on requiring OCSP information in end-entity TLS BR certificates, the TLS BR linter should be adjusted to not report on the omission of OCSP information.
Microsoft still requires one (or both) of CRL or OCSP information pointers regardless of the validity period of the certificate.
Given this, here's the plan of attack:
Create new certificate types for DV, IV, OV, and EV with "_SHORT_LIVED" in the type name
Align with the TLS BR OCSP/CRL pointer inclusion rules as specified in SC-63
Add a new validator that checks for the inclusion of either CRL or OCSP information. The finding code for this validation will be prefixed with "msft." (not "cabf.serverauth") to make it clear this is not a CABF requirement, but rather a MSFT requirement. This validator will be enabled by default by the serverauth linter, as most all publicly trusted CAs are included in MSFT.
The text was updated successfully, but these errors were encountered:
Now that Microsoft has relaxed its policy on requiring OCSP information in end-entity TLS BR certificates, the TLS BR linter should be adjusted to not report on the omission of OCSP information.
Microsoft still requires one (or both) of CRL or OCSP information pointers regardless of the validity period of the certificate.
Given this, here's the plan of attack:
The text was updated successfully, but these errors were encountered: