Richard, Please check the updated file I posted. My check to exclude certain certificates was broken in the first pass but the revised version properly excludes them.
The content is still at https://docs.google.com/spreadsheets/d/1lJt-1tkgKcbw5woEr4-tcpqB-M-HKwjFNSdX2jla2EU/edit?usp=sharing, but has been updated. Thanks, Peter On Tue, Nov 17, 2015 at 6:07 PM, Richard Wang <[email protected]> wrote: > I checked your list that the excel list number are: 6653 -- 6662, 29830 -- > 29841, 30434 -- 30437, they are all Client certificates without serverAuth > EKU, but listed, please check it, thanks. > > The attached certificate is No. 6653, please check its EKU, thanks. > > > Best Regards, > > Richard > > > -----Original Message----- > From: Peter Bowen [mailto:[email protected]] > Sent: Wednesday, November 18, 2015 12:33 AM > To: Richard Wang <[email protected]> > Cc: Rob Stradling <[email protected]>; Peter Gutmann > <[email protected]>; [email protected] > Subject: Re: [FORGED] Name issues in public certificates > > On Tue, Nov 17, 2015 at 6:12 AM, Richard Wang <[email protected]> wrote: >> I also found some mistakes for the list: >> 1. I see some client certificate in the report that it say the email >> as common name is wrong; > > I filtered for certificates that includes the serverAuth EKU or do not include > any EKUs. Can you provide an example of a clientAuth certificate that was > incorrectly included? > >> 2. IP address is allowed by BR; > > IP addresses are only allowed in the commonName or as IPAddress type in the > SAN extension. If the rule is _ipv4_not_allowed_here, then that means that an > IP address was included in a SAN as a DNS Name, which is disallowed. I will > also fix the IP check to differentiate between reserved IPs (as defined in the > BRs) and special purpose IPs (which are allowed if not reserved). The BRs do > not clearly state that 192.168.0.0/24, 172.16.0.0/12, and other special > purpose IPs are disallowed. > >> 3. IDN is allowed, but also in the report > > See my note to Rob; I'm fixing that. I misread RFC 5280 section 7.2. > > Thanks, > Peter > > _______________________________________________ > dev-security-policy mailing list > [email protected] > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

