Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CRL Certificate Revocation List, missing feature: persistence of invalidated serial numbers, certificate chains (more than just provider / CR-root) #36

Open
danielweck opened this issue Apr 25, 2017 · 0 comments

Comments

@danielweck
Copy link
Member

T-Systems: 3-tier intermediary certificate
(current LCP app only ships "root CA" certificate, to verify provider certs extracted from LCP JSON licenses)

Recommendation: activate DISABLE_CRL preprocessor directive (or remove code in source tree). This will remove dependency on C++ thread (10mn interval check for CRL distribution points) and NetProvider.
Instead, make use of platform-specific crypt/cert API for CRL and other cert verification tasks?

See also:
#25

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant