On Mon, Oct 29, 2012 at 11:04 AM, Jakob Bohm <jb-open...@wisemo.com> wrote: > On 10/27/2012 10:58 PM, Jeffrey Walton wrote: >> >> On Sat, Oct 27, 2012 at 11:00 AM, Alban D. <blan...@gmail.com> wrote: >>> >>> Hi everyone, >>> >>> iSEC Partners just released a paper that provides detailed guidelines >>> and sample code on how to properly do certificate validation with >>> OpenSSL: >>> >>> http://www.isecpartners.com/blog/2012/10/14/the-lurking-menace-of-broken-tls-validation.html >>> >>> It is not trivial and so I thought this reference material could be >>> useful to people on this mailing list. >> >> >> ] Supporting wildcard certificates requires manually parsing >> ] the name to find the wildcard character, ensuring that it is >> ] in a valid location within the domain, and then trying to >> ] match the pattern with the server's expected hostname. >> Don''t do it because it violates the Principal of Least Privilege. Why >> should users be asked to trust the receptionist's machine in the lobby >> or a developer's machine with nearly anything installed? >> >> If you are in a multi-domain environment (such as Apache with virtual >> hosts), use multiple certificates or Server Name Indication (SNI). >> > > You obviously don't understand the proper uses and necessity of > wildcard certificates: Actually, I do. Its not a risk I am willing to accept. As a security architect, I am more than happy to kick software that follows the practice.
Jeff ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org