You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I did some research on OCSP, this is actually quiet important.
Especially when we go production in CV, we have to be able to protect ourselves against a compromise of our private key.
The only alternative I know, CRLs, isn't available in the Rust community and as far as I know there are no plans to add support.
webpki/cert: extendverify_is_valid_for
to iPAddress SAN briansmith/webpki#54Validation of IP address name constraints should be stricter briansmith/webpki#130Non-standard certificates that identify a DNS name (or IP address) using the CN field of the subject are rejected; provide some way to opt into supporting them. briansmith/webpki#90Allow disabling Hostname Verification rustls/rustls#578How to use ServerSession get_sni_hostname to switch the ServerConfig to generate new ServerSession and ask client to reinitiate handshake? rustls/rustls#430Add OCSP support sufficient for client-side OCSP stapling for end-entity certificates briansmith/webpki#26Add OCSP support sufficient for server-side OCSP stapling for end-entity certs briansmith/webpki#27Add Must-Staple support. briansmith/webpki#28The text was updated successfully, but these errors were encountered: