On 19/12/2018 04:14, Peter Bowen wrote:
> On Tue, Dec 18, 2018 at 6:52 PM Jeremy Rowley via dev-security-policy <
> [email protected]> wrote:
> 
>> Ballot 202 failed. I’m not sure how it’s relevant other than to indicate
>> there was definite disagreement about whether underscores were permitted or
>> not. As previously mentioned, I didn’t consider underscore characters
>> prohibited until the ballot was proposed eliminating them in Oct. I know
>> the general Mozilla population disagrees but, right or wrong, that’s the
>> root cause of it all. I can explain my reasoning again here, but I doubt it
>> materially alters the conversation and outcome.
>>
> 
> I agree that Jeremy that the situation with underscores was unclear prior
> to the ballot in October.  Three years ago when I was writing certlint, my
> very first public commit has the comment:
> # Allow RFC defying '*' and '_'
> 
> I honestly haven't been pay a lot of attention to the CA/Browser Forum
> recently.  Given the rationale for getting rid of underscores is RFC
> compliance, did the ballot also disallow asterisks?  They are also not
> allowed by the "preferred name syntax", as specified by Section 3.5 of
> [RFC1034] <https://tools.ietf.org/html/rfc1034#section-3.5> and as modified
> by Section 2.1 of <https://tools.ietf.org/html/rfc1123#section-2.1>
>   [RFC1123] <https://tools.ietf.org/html/rfc1123#section-2.1>.
> 

The problematic section of RFC5280 contains this paragraph, wedged between 
encoding descriptions (which happen to include a reference to the "preferred 
syntax" of host names) and the corresponding ASN.1 syntax:

   Finally, the semantics of subject alternative names that include
   wildcard characters (e.g., as a placeholder for a set of names) are
   not addressed by this specification.  Applications with specific
   requirements MAY use such names, but they must define the semantics.

A different RFC defines the modern semantics of wildcard certificates, 
thus providing the required definition.

Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded 
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to