On 2016-04-20 15:48, Ryan Sleevi wrote:
On Tuesday, April 19, 2016 at 10:15:16 AM UTC-7, Nick Lamb wrote:
Some more thoughts (my previous substantive comments are awaiting moderation 
because I foolishly sent them before subscribing)

1. Historically other CAs in this family have issued certificates which abuse 
wildcards, like this:

https://crt.sh/?id=16640133&opt=cablint

Over the several years this request has been floating, no-one from Symantec / 
Verisign mentioned these violations. Can we expect the same from the root which 
is to be granted EV in this request? Or has Symantec since put in place an 
effective control against this sort of wildcard abuse? If so, when?

[Not a Symantec representative, just a party who has argued such certificates 
violate the BRs]

Symantec has, based on discussions in the CA/B Forum, argued that this 
restriction is ambiguous, and thus chosen to interpret the Baseline 
Requirements in the most permissive fashion possible, despite many other CAs 
reading it and taking the strict approach, which is also consistent with the 
material advice of RFC 6125, and of the practical implementation of Chrome and 
Firefox (which explicitly prohibit such certificates)

RFC 6125 has:
6.4.3.  Checking of Wildcard Certificates
[...]

   3.  The client MAY match a presented identifier in which the wildcard
       character is not the only character of the label (e.g.,
       baz*.example.net and *baz.example.net and b*z.example.net would
       be taken to match baz1.example.net and foobaz.example.net and
       buzz.example.net, respectively).  However, the client SHOULD NOT
       attempt to match a presented identifier where the wildcard
       character is embedded within an A-label or U-label [IDNA-DEFS] of
       an internationalized domain name [IDNA-PROTO].


So the RFC seems to allow it to me, but a client can obviously decide not to do it.


Kurt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to