This site will have limited functionality while we undergo maintenance to improve your experience. If an article doesn't solve your issue and you want to ask a question, we have our support community waiting to help you at @FirefoxSupport on Twitter and/r/firefox on Reddit.

Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

when will Mozilla support Expect-CT, a new security header

  • 1 odgovor
  • 1 ima ovaj problem
  • 68 views
  • Posljednji odgovor poslao cor-el

more options

"Expect-CT is a new security header which is, at the moment, only supported by Chrome and Opera browsers. It allows a website to instruct the browser to reject any certificate not found in Certificate Transparency, a read-only public log of certificates which can be audited. Because Expect-CT is an HTTP header, it is a trust-on-first-use protocol that relies on long-term caching to ensure security. While Expect-CT does not prevent a compromised Certificate Authority from issuing a fake certificate, it does limit the damage by forcing the addition of the certificate to the log. The domain owner can then report the fake certificate and attempt to get it revoked." [Protonmail]

"Expect-CT is a new security header which is, at the moment, only supported by Chrome and Opera browsers. It allows a website to instruct the browser to reject any certificate not found in Certificate Transparency, a read-only public log of certificates which can be audited. Because Expect-CT is an HTTP header, it is a trust-on-first-use protocol that relies on long-term caching to ensure security. While Expect-CT does not prevent a compromised Certificate Authority from issuing a fake certificate, it does limit the damage by forcing the addition of the certificate to the log. The domain owner can then report the fake certificate and attempt to get it revoked." [Protonmail]

Izabrano rješenje

Expect-CT (Certificate Transparency) isn't really a new concept as it goes back to 2014.

Certificate Transparency has been implemented in Firefox for telemetry, but is disabled because of negative impact on the performance.

If you want to spend some time on reading:


security.pki.certificate_transparency.mode (0 | 1)


Some related bug reports:

  • Bug 1281469 - Implement Certificate Transparency support (RFC 6962)
  • Bug 1349941 - Support Expect-CT for Opting-in to Certificate Transparency [RW]
  • Bug 1353216 - certificate transparency signature verifications negatively impact TLS handshake performance
  • Bug 1355903 - Re-enable Certificate Transparency telemetry collection

(please do not comment in bug reports
https://bugzilla.mozilla.org/page.cgi?id=etiquette.html
)

Pročitajte ovaj odgovor sa objašnjenjem 👍 0

All Replies (1)

more options

Odabrano rješenje

Expect-CT (Certificate Transparency) isn't really a new concept as it goes back to 2014.

Certificate Transparency has been implemented in Firefox for telemetry, but is disabled because of negative impact on the performance.

If you want to spend some time on reading:


security.pki.certificate_transparency.mode (0 | 1)


Some related bug reports:

  • Bug 1281469 - Implement Certificate Transparency support (RFC 6962)
  • Bug 1349941 - Support Expect-CT for Opting-in to Certificate Transparency [RW]
  • Bug 1353216 - certificate transparency signature verifications negatively impact TLS handshake performance
  • Bug 1355903 - Re-enable Certificate Transparency telemetry collection

(please do not comment in bug reports
https://bugzilla.mozilla.org/page.cgi?id=etiquette.html
)