On 2019-01-24 9:47, Buschart, Rufus wrote:
Good morning!

I would like to sharpen my argument from below a little bit: If a CA gets a 
request to issue a certificate for the domain xn--gau-7ka.siemens.de, how can 
the CA tell, that xn--gau-7ka is a punycode string in IDNA2008 and not only a 
very strange server name? At least I don't have a glass bowl to read the mind 
of my customers. Therefor I would say, it is perfectly okay to issue a 
certificate for xn--gau-7ka.siemens.de as long as you perform a successful 
domain validation for xn--gau-7ka.siemens.de.

Will you fill something in in the commonName? I think what is expected in the commonName is what the user would type and expect to see, I don't think the commonName should contain xn--gau-7ka.siemens.de. If you have a commonName, I would expect that it contains gauß.siemens.de. And if you create a commonName then, you are required to check that it matches the xn--gau-7ka.siemens.de in the SAN.


Kurt
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to