On 24/03/15 09:35, Florian Weimer wrote:
> Sadly, name constraints do not work because they do not constrain the
> Common Name field.  The IETF PKIX WG explicitly rejected an erratum
> which corrected this oversight.
> 
> NSS used to be different (before the mozilla::pkix rewrite), but it's
> not PKIX-compliant.

My understanding is that we continue to constrain the CN field using
name constraints, even after adopting mozilla::pkix; do you know
differently?

Anyway, the BRs require that the value in the CN field be repeated in
the SAN field. So, at some point in the future, for publicly-trusted
certs anyway, we can start ignoring the CN field.

>From BRs draft 30b:

"If  present,  this  field  MUST  contain  a  single  Fully-Qualified
Domain  Name that  is  one  of  the  values contained in the
Certificate's subjectAltName extension (see Section 9.2.1)."

The BRs were adopted in 2011 and had an effective date of 1st July 2012.
At the time, they permitted 5 year issuance. So on 1st July 2017, we
should be able to start ignoring CN if we want.

(The fact that this is such a long time away is a good argument for
reducing cert lifetimes!)

Gerv

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to