dNSName is a DNS name.  It can be an IP, but I'm not sure about the
encoding rules for it (SMTP requires an IP in the destination field to
be in the form [192.168.1.1] (in square brackets), but I don't know
about X.509v3; it could just be the IP without decoration.)

subjectAltName=dNSName: domain.com
subjectAltName=dNSName: *.domain.com
subjectAltName=dNSName: *.*.domain.com

The binding isn't done via IP address (as DNS can be spoofed), but
rather by proof of possession of secret key.

-Kyle H

On 2/10/06, Khai Doan <[EMAIL PROTECTED]> wrote:
> To quote rfc 2818:
>
>    If a subjectAltName extension of type dNSName is present, that MUST
>    be used as the identity. Otherwise, the (most specific) Common Name
>    field in the Subject field of the certificate MUST be used. Although
>    the use of the Common Name is existing practice, it is deprecated and
>    Certification Authorities are encouraged to use the dNSName instead.
>
> Can some give me an example?  Am I doing this correctly:
>
> subjectAltName=dNSName:192.168.1.12
>
> What is value for dNSName ?  Is it supposed to be IP address?  Is it
> supposed to be www.domain.com ?
>
> I wish to create wild card certificates of the form *.domain.com and
> *.*.domain.com that bind to a single IP address.  Has anyone done this?
> Does it work with Internet Explorer ?
>
> Thank you.
>
> Khai
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to