Please see the revised webrev here:
http://cr.openjdk.java.net/~juh/8054380/webrev.02/

Additional changes include:
1. Verification of the DNSName during certificate parsing
2. Allowing each component to start with a letter or digit
2. A check to make sure the final character of a component ends in a digit or letter (RFC 952 grammar rules)

Thanks,
Jason

On 08/08/2014 01:59 AM, Florian Weimer wrote:
On 08/07/2014 03:32 PM, Sean Mullan wrote:
On 08/07/2014 08:47 AM, Florian Weimer wrote:
I wonder why using the HTTPS to access <https://www.3com.com> works with
the current jdk9-dev code.  The name "www.3com.com" is only present in
the SAN.

Is the SAN extension non-critical? If so, that could explain why. We
allow X509Certificates to be created with unparseable non-critical
extensions.

Yes, it's marked as non-critical.  But this doesn't really explain the
lack of an exception because the www.3com.com dNSName is obviously used
(there's no TLS handshake failure).

Reply via email to