Le mardi 24 mars 2015 15:32:10 UTC+1, Florian Weimer a écrit :
> * Kurt Roeckx:

> > We know that not everybody does add the SANs.  But I think that if
> > there is a name constraint and there is no SAN we should just either
> > reject the certificate for being invalid or for not matching.
> 
> This has to be integrated with certificate path processing somehow.
> Maybe it is feasible to ignore the Subject DN if there is a name
> constraint anywhere on the path?

Ignore the CN when validating a certificate for TLS use.
NameConstraints can have a directoryName form, and it applies to the SubjectDN.

> That would be fairly straightforward to implement with other PKIX
> validators (which generally lack the NSS hack for Common Name
> verification).

Providing support for legacy use of CN as FQDN while being strict on 
what-should-be-done isn't straightforward. Some bugs were raised when Firefox 
decided to disallow self-signed CA certs used as TLS server certs also.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to