Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company’s root certificates. […] Users need to update their browsers to Firefox 128 (released in July 2024) or later and ESR 115.13 or later for ‘Extended Support Release’ (ESR) users.

    • kbal@fedia.io
      link
      fedilink
      arrow-up
      2
      ·
      2 days ago

      There are many slightly different options I suppose, but personally I’d start with the simple and obvious approach suggested by the principle of least surprise: Check the expiry date on the extension signing cert only when an extension is installed. On subsequent startups, attempt to check for revocations.

      Software should not self-destruct if it can’t reach the mothership.

        • kbal@fedia.io
          link
          fedilink
          arrow-up
          1
          ·
          2 days ago

          That would depend on the parameters of “possible” but it has no bearing on the topic at hand. It seems likely that you ask due to mistaking the idea of not requiring everything to be periodically re-signed by Mozilla in order to keep running for the unrelated idea of not checking the signature at all.

          P.S. Okay that may be slightly wrong but I mean it’s not as if two-years-old keys are automatically compromised just because they’re that old. If there’s reason to believe they’re at risk, let them be revoked for cause.