Firefox just made themselves the best browser for HTTPS revocation, with OCSP Must-staple and short-lived certs: https://blog.mozilla.org/security/2015/11/23/improving-revocation-ocsp-must-staple-and-short-lived-certificates/ …
-
-
@BRIAN_____@sleevi_@rlbarnes@konklone do you really think this is the problem? I think there should be enough interested parties to fund -
-
@BRIAN_____@hanno Started implementing OCSP stapling+refresh for Apache's mod_gnutls. Had trouble with bugs in hacks for mod_ssl+mod_proxy. -
@TheSecurityFail@hanno Interesting. Would love to learn more about that. -
@BRIAN_____@hanno Cf. https://github.com/BenBE/mod_gnutls/tree/stapling … - Basic stuff was done. mod_gnutls+mod_proxy didn't want to work together though :(
End of conversation
New conversation -
-
-
@BRIAN_____@sleevi_@hanno@rlbarnes@konklone in nginx OCSP staple commit: "Thanks to Comodo, DigiCert and GlobalSign for sponsoring this" -
@prdonahue@sleevi_@hanno@rlbarnes@konklone Yes & they should be commended for it. Additional improvements just need additional funding.
End of conversation
New conversation -
-
-
@BRIAN_____@hanno@rlbarnes@konklone I guess mai tai's in Hawaii aren't as free and flowing as I was lead to believe ;) -
New conversation -
-
-
@BRIAN_____@sleevi_@hanno@rlbarnes@konklone how many $$ ?Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.