Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Any idea how they changed the cache time remotely? If the OS is honouring the cache control headers of a plain text response this has its own security implications.


The OCSP response has a nextUpdate field: https://www.ietf.org/rfc/rfc2560.txt


The response is signed by Apple, and presumably (!) your Mac is validating that signature correctly. I haven't checked if they are using stapling, but that would be the sensible way to do it, in which case it is a server side parameter (though possibility with client side limits too, but you'd need to disassemble the binary).




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: