-
Notifications
You must be signed in to change notification settings - Fork 232
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
list of firefox ocsp servers #73
Comments
Thanks for this. Hopefully helps people to debug all those mystery connections. |
i think in this comment ill keep an up to date list of ocsp servers which i encounter (since CAs push their own ocsp servers to clients. ocsp servers not in firefox's db will still be used)
|
which whitelist are you talking about |
Moreover, Certificate Revocation Lists (“CRLs”) are used to track revoked certificates. Your browser will download these lists to verify if a certificate presented by a web site has been revoked: https://isc.sans.edu/crls.html lists the Certificates Revoked per Day. |
i did this for my own reasons but thought i would post it here in case it would be useful to anybody else. i read my cert8.db and these were the ocsp servers i found. it could be useful for those who might go as far as to block all background connections except whitelisted ones, or maybe those who force https on all domains except whitelisted ones (the majority of ocsp servers dont use https). or maybe those just wondering what the connections to these ips are
see my post underneath this for ocsp servers not included by default
IPs:
The text was updated successfully, but these errors were encountered: