Hi Daniel, Richard,

In the latest version, we added the following text:

It is noted that the requirements regarding host name validation (and in general, binding between the TLS layer and the protocol that runs above it) vary between different protocols. For HTTPS, these requirements are defined by Sec. 3 of [RFC2818].

Readers are referred to [RFC6125] for further details regarding generic host name validation in the TLS context. In addition, the RFC contains a long list of example protocols, some of which implement a policy very different from HTTPS.

Can you please comment on this text? Please bear in mind that our context is wider than just HTTPS.

Thanks,
        Yaron


On 08/29/2014 12:53 AM, Daniel Stenberg wrote:
On Thu, 28 Aug 2014, Richard Moore wrote:

I've found (and reported or fixed) flaws in the hostname verification
of pretty much all the browsers and libraries and I don't think the
rules are clear. I'm happy to add the test cases I use for testing
this stuff myself to the rfc as examples if people think that would be
helpful.

As author of one of those libs Richard speaks of, I can only say that I
would be happy to see such test cases.

Had we had such tests (and preferably a single RFC detailing all on how
to verify a TLS server certificate) in the past, perhaps we could have
avoided a few nasty security vulnerabilities.

--

  / daniel.haxx.se

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to