Andy LoPresto created NIFI-4222:
-----------------------------------

             Summary: TLS Toolkit should provide SAN by default
                 Key: NIFI-4222
                 URL: https://issues.apache.org/jira/browse/NIFI-4222
             Project: Apache NiFi
          Issue Type: Improvement
          Components: Tools and Build
    Affects Versions: 1.3.0
            Reporter: Andy LoPresto


As of Chrome 58, the browser will only use the *SubjectAlternativeName* entries 
to determine hostname verification, rather than the *CN*. This is specified in 
RFC 6215 [1], TLS hostname verification must attempt to use the SAN entries 
first and may only use the CN entry if no SAN entries are available. 

Chrome takes this a step further [2]: 

{quote}
During Transport Layer Security (TLS) connections, Chrome browser checks to 
make sure the connection to the site is using a valid, trusted server 
certificate.

For Chrome 58 and later, only the subjectAlternativeName extension, not 
commonName, is used to match the domain name and site certificate. The 
certificate subject alternative name can be a domain name or IP address. If the 
certificate doesn’t have the correct subjectAlternativeName extension, users 
get a NET::ERR_CERT_COMMON_NAME_INVALID error letting them know that the 
connection isn’t private. If the certificate is missing a 
subjectAlternativeName extension, users see a warning in the Security panel in 
Chrome DevTools that lets them know the subject alternative name is missing.
{quote}

As this will cause issues for users who do not manually provide a SAN when 
generating their certificates using the TLS Toolkit, the toolkit should be 
modified to automatically include the provided CN as a SAN entry, in addition 
to any manually-provided SAN entries. 

[1] https://tools.ietf.org/html/rfc6125#section-6.4.4
[2] https://support.google.com/chrome/a/answer/7391219?hl=en



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to