On 10/7/10 8:00 PM, Martin Rex wrote:
> Matt McCutchen wrote:
>>
>> I have never seen a certificate with a wildcard that is not a
>> whole label on a public web site.
> 
> Btw. the use of TLS is not limited to the public internet.

I don't think anyone said it is. However, it's difficult for researchers
to do much testing of sites that are closed off from the public
internet, so that's the real-world data that folks tend to mention.

Speaking of which, someone contacted Jeff and me off-list about some
research results showing that of a very large number of certificates
presented by TLS-protected websites, less than 0.01% contain wildcards
in component fragments. Given that minuscule level of deployment, I
don't see good reasons to spend more cycles on the topic.

> I don't think that know which _public_ website uses this is meaningless.
> The matching is implemented on the client anyway, not on the server.

Yes it is, but requiring significantly more complex matching to handle
less than 0.01% of the issued certificates seems like a bad idea, i.e.,
not a *best* current practice.

> A much more interesting question would be, what exact kind of wildcard
> matching do popular TLS clients actually implement?

Why is that a much more interesting question?

>    - Microsoft SChannel on XP/2003, Vista/Win7 
>    - Firefox 3.x
>    - Google Chrome
>    - Apple Safari (non-Windows)
>    - Opera
> 
> We started shipping SSL with our app in 2000/2001.  Back then,
> I noticed that MSIE 5.0x implemented (full-label) wildcard matching
> (i.e. WinNT 4 and Win9x/ME), but SChannel in Windows 2000 and therefore
> MSIE 5.0x on Windows 2000 did _NOT_ implement wildcard matching.
> For internal testing, I've been using server certs with wildcard CN-IDs
> since 2000, but not being aware of the wildcards substring matching
> described in rfc2818 back then, I never tried that myself.
> 
> I did issue server certs for wildcard substring matching when I
> implemented rfc-2818, though -- and I consider it likely that other
> implementors did this as well.

That's nice, but not directly relevant to the current discussion because
the I-D that Jeff and I have worked on does not override, supersede, or
obsolete RFC 2818 or any other prior art about matching rules for
application server identity. Instead, we are attempting to abstract from
that prior art to formulate forward-looking rules that capture the best
aspects of current practice in a form that future application protocols
can reference. If someday folks in the HTTP community wish to update or
obsolete RFC 2818 by referencing this I-D, they will be free to do so --
but that is not the purpose of the work that Jeff and I have done.

Peter

--
Peter Saint-Andre
https://stpeter.im/
_______________________________________________
certid mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/certid

Reply via email to