The focus should be on halting the practice; a chaotic reissue would serve little purpose. But sure, I'd ban the OU entirely.
-
-
-
I see this as worse than some of the other mass revocation events of recent. Populating the OU indicates the CA did some sort of org validation, which might mislead someone viewing the cert in a certificate viewer, etc.
- Još 1 odgovor
Novi razgovor -
-
-
How I determined the number of afflicted certificates: https://censys.io/certificates?q=%28%28parsed.subject.organizational_unit%3A+%22hosted+by%22+OR+parsed.subject.organizational_unit%3A+%22positivessl+multi+domain%22+OR++parsed.subject.organizational_unit%3A+%22ssl+unified+communications%22%29+AND+tags.raw%3A+%22trusted%22%29+AND+tags.raw%3A+%22dv%22& …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
And continue to do so. "We have not yet stopped adding these additional OU fields. We will stop doing so on 2019-12-15 00:00 (UTC)."
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.