Inspired by Rob Stradling's work
(https://cabforum.org/pipermail/public/2015-November/006269.html), I
wrote a quick tool to check that commonNames and Subject Alternative
Names in server auth certificates issued by public CAs were following
the CA/Browser Forum baseline requirements.

The resulting report of anomalies is available at
https://docs.google.com/spreadsheets/d/1lJt-1tkgKcbw5woEr4-tcpqB-M-HKwjFNSdX2jla2EU/edit?usp=sharing

The rules are a rather strict interpretation of RFC 5280 and the
Baseline Requirements.  Notably, it will complain if FQDNs are not
converted to ASCII (as defined in 7.2 and 7.3 of RFC 5280) and will
complain if there is an IP address flaged as a dNSName in a
Generalized Name.

There are a couple of rules that may create false positives, so please
don't assume every certificate on the sheet is problematic.

Thanks,
Peter
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to