(Resending: first copy seems to have bounced off the server.)
On 2010-06-04 09:37 PDT, Martin Rex wrote:

> I am perfectly well aware of the wording in rfc-2818.
> 
> But security-wise an X.509 Cert containing
> 
> CN=host1.example.com, CN=host2.example.com, CN=host3.example.com
> 
> is significantly less dangerous that an X.509 Cert containing
> 
> CN=*.example.com
> 
> and therefore this wording in rfc-2818 is unreasonable in several aspects
> and I chose to completely and deliberately ignore it in my 
> implementation.

I'm not surprised that you say that.  It's not the first time you've
told us that you've deliberately ignored something in an RFC that you
considered unreasonable.

But consider that, because of the wording that you ignore, some (many) CAs
will only check the DNS name in ONE of the CNs in the cert subject name.
Other CNs may contain strings whose contents are unchecked.
If you rely on their contents, you're relying on unchecked DNS names.
I wouldn't call that "significantly less dangerous" than a wildcard cert
whose domain (not host) name part has been checked.

Now, as an aside, I think the practice of CAs to put unchecked and
unvetted data ("certified nonsense") into the subject names of their
certs is reprehensible, and IMO, the RFCs should all explicitly
disallow it.  Maybe this draft is the place to start.  But until then,
sadly, it will remain the case that some CAs check only certain specific
attributes (and then only the last one) in the names of the certs they
issue, and software that chooses to honor other fields will be vulnerable.

> Btw. I did not understand the meaning of "most specific" anyway, so I
> considered it unlikely that this could be interoperably implement by only
> matching a single CN= entry.  While the initial definition of
> distinguished names might have had a hierarchical directory structure in
> mind,

The initial, *AND CURRENT*, definitions of DNs still have a hierarchical
organization.  X.501 is worth a read.

> one does find distinguished names in "unusal" ordering out there, as well
> as distinguished names entirely without country AVA, even ones with only
> CN=

True.  There's no requirement that any particular attribute types appear
in any hierarchy.  X.501 talks about this at length.
_______________________________________________
certid mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/certid

Reply via email to