CABF Ballot 153 (no ocsp in shortlived certs), Pyrrhic victory? For (4 browsers and 4 CAs), against (1 browser and 17 CAs). Browsers ignore.
-
-
Replying to @Cryptoki
@Cryptoki@ivanristic CABForum regulates CA behavior, not browser behavior.1 reply 0 retweets 0 likes -
Replying to @BRIAN_____
@BRIAN_____@Cryptoki Really? Why is “B” in the name then?1 reply 0 retweets 0 likes -
Replying to @ivanristic
@ivanristic@Cryptoki CAs and Browsers vote on rules imposed on CAs.1 reply 0 retweets 1 like -
Replying to @BRIAN_____
@BRIAN_____@ivanristic and browsers ignore when doesn't go their way :)2 replies 0 retweets 0 likes -
Replying to @Cryptoki
@Cryptoki@ivanristic It was about allowing a CRL link instead of an OCSP link in SLCs. It didn't help/hurt any browser actually doing SLCs.1 reply 0 retweets 0 likes -
Replying to @BRIAN_____
@BRIAN_____@ivanristic saves mucho dinero for#LetsEncrypt2 replies 0 retweets 0 likes -
Replying to @Cryptoki
@Cryptoki@ivanristic Yep, effectively the vote was about saving Let's Encrypt money. No surprise that most CAs didn't want to help them.1 reply 0 retweets 1 like -
Replying to @BRIAN_____
@BRIAN_____@Cryptoki@ivanristic smaller certs are nice for service operators and users, too2 replies 0 retweets 0 likes
@hillbrad @Cryptoki @ivanristic The ballot required a CRL URL instead of an OCSP URL, so it didn't even try to change the size of certs.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.