Hello Dimitris, of course not, because the underscore is not part of the syntax for a hostname acc. RFC 1034, chapter 3.5. whereas xn--gau-7ka.siemens.de is a perfectly valid hostname.
With best regards, Rufus Buschart Siemens AG Information Technology Human Resources PKI / Trustcenter GS IT HR 7 4 Hugo-Junkers-Str. 9 90411 Nuernberg, Germany Tel.: +49 1522 2894134 mailto:rufus.busch...@siemens.com www.twitter.com/siemens www.siemens.com/ingenuityforlife Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim Hagemann Snabe; Managing Board: Joe Kaeser, Chairman, President and Chief Executive Officer; Roland Busch, Lisa Davis, Klaus Helmrich, Janina Kugel, Cedrik Neike, Michael Sen, Ralf P. Thomas; Registered offices: Berlin and Munich, Germany; Commercial registries: Berlin Charlottenburg, HRB 12300, Munich, HRB 6684; WEEE-Reg.-No. DE 23691322 > -----Ursprüngliche Nachricht----- > Von: Dimitris Zacharopoulos <ji...@it.auth.gr> > Gesendet: Donnerstag, 24. Januar 2019 11:16 > An: Buschart, Rufus (GS IT HR 7 4) <rufus.busch...@siemens.com>; > mozilla-dev-security-pol...@lists.mozilla.org > Betreff: Re: AW: Incident Report DFN-PKI: Non-IDNA2003 encoded international > domain names > > On 24/1/2019 10:47 π.μ., Buschart, Rufus via dev-security-policy wrote: > > Good morning! > > > > I would like to sharpen my argument from below a little bit: If a CA gets a > > request to issue a certificate for the domain xn--gau- > 7ka.siemens.de, how can the CA tell, that xn--gau-7ka is a punycode string in > IDNA2008 and not only a very strange server name? At > least I don't have a glass bowl to read the mind of my customers. Therefor I > would say, it is perfectly okay to issue a certificate for xn-- > gau-7ka.siemens.de as long as you perform a successful domain validation for > xn--gau-7ka.siemens.de. > By following this argument, you would also approve issuance of domain names > that contain the underscore "_" character, right? > > Dimitris. > > > With best regards, > > Rufus Buschart > > > > Siemens AG > > Information Technology > > Human Resources > > PKI / Trustcenter > > GS IT HR 7 4 > > Hugo-Junkers-Str. 9 > > 90411 Nuernberg, Germany > > Tel.: +49 1522 2894134 > > mailto:rufus.busch...@siemens.com > > www.twitter.com/siemens > > > > www.siemens.com/ingenuityforlife > > > > Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim > > Hagemann Snabe; Managing Board: Joe Kaeser, Chairman, President and > > Chief Executive Officer; Roland Busch, Lisa Davis, Klaus Helmrich, > > Janina Kugel, Cedrik Neike, Michael Sen, Ralf P. Thomas; Registered > > offices: Berlin and Munich, Germany; Commercial registries: Berlin > > Charlottenburg, HRB 12300, Munich, HRB 6684; WEEE-Reg.-No. DE 23691322 > > > >> -----Ursprüngliche Nachricht----- > >> Von: dev-security-policy > >> <dev-security-policy-boun...@lists.mozilla.org> Im Auftrag von > >> Buschart, Rufus via dev-security-policy > >> Gesendet: Mittwoch, 23. Januar 2019 20:24 > >> An: mozilla-dev-security-pol...@lists.mozilla.org > >> Betreff: AW: Incident Report DFN-PKI: Non-IDNA2003 encoded > >> international domain names > >> > >> Hello! > >> > >>> Von: Servercert-wg <mailto:servercert-wg-boun...@cabforum.org> Im > >>> Auftrag von Wayne Thayer via Servercert-wg > >>> > >>>> On Mon, Jan 21, 2019 at 5:50 PM Jeremy Rowley via Servercert-wg > >>>> <mailto:servercert...@cabforum.org> wrote: > >>>> We received a report for someone saying that certificates issued with > >>>> puny-code are mis-issued if they use IDNA2008. > >>>> Considering a number of people probably received the same report, I > >>>> figured we should raise and discuss the implications here. > >>>> ISSUES: > >>>> 1. Does a CA have to check the puny-code provided by a customer for > >>>> compliance? Generally, we send the validation request to the > >>>> puny-code domain (not the pre-conversation name). This confirms > >> control over the domain so is there a need to check this? > >>>> If we aren’t doing the conversion, are we actually an implementer in > >>>> this case? > >>> The BRs require 5280 compliance, so yes I think CAs need to ensure that > >>> certificates they sign conform to IDNA2003. > >> Where exactly in RFC5280 do you find the requirement that domains > >> that follow IDNA2008 but not IDNA2003 are not permitted in a > >> certificate? If I understand chapter 7.3 of RFC2008 correctly, it > >> describes how to process a domain that follows IDNA2003 (rfc3490) > but it does not forbid that a domain can be encoded in IDNA2008 (rfc5890 / > rfc5891). It simply says nothing special about how to > handle it. > >> Therefor I would interpret RFC5280 that in this case the domain name > >> in punycode can (or better say MUST) be treated like any other domain name. > >> > >> Excerpt from the bug mentioned by Jürgen: > >>> Question: Are ACE-labels not encoded as IDNA 2003 in certificates a > >>> misissuance under the Baseline Requirements? Yes, we think > >> this is currently the case: > >>> Baseline Requirements mandate conformance to exactly RFC 5280 and > >>> don't reference/allow any updates, e.g., RFC 8399 > >>> > >>> Chapter 7.2 of RFC 5280 https://tools.ietf.org/html/rfc5280#page-97 > >>> states: > >>> "Specifically, conforming implementations MUST perform the > >>> conversion operation specified in Section 4 of RFC 3490, with the > >> following clarifications: ...." > >>> So, IDNs must be converted according to the rules of RFC 3490 > >>> > >>> We, as a CA, don't perform the conversion mentioned in RFC 5280. We > >>> receive/process ACE-labels only. This means that our system > >> is likely not meant by the wording "conforming implementations" of RFC > >> 5280. > >>> However, our systems have the technical means and generally the > >>> responsibility to check for correct input. So, we shall > >> check/enforce IDNA 2003 ACE-labels. > >> > >> I don't share your opinion, that you MUST check if a domain is a > >> valid IDNA2003 domain, just because you could technically do so. I > >> think this leads on a very slippery road. With the same argument one > >> could require a CA to scan every web server before the issuance of a > >> certificate (or even regularly while the certificate is valid) if the web > >> server is distributing malware (BRGs chapter 9.6.3 sub bullet 8). > And this is obviously not the duty of a CA. So I understand the spirit of RFC > 5280 and the BRGs that a CA has to perform domain > validation on the ACE-label but not to enforce any additional syntax on top > of validated dNSNames. > >> > >> With best regards, > >> Rufus Buschart > >> > >> Siemens AG > >> Information Technology > >> Human Resources > >> PKI / Trustcenter > >> GS IT HR 7 4 > >> Hugo-Junkers-Str. 9 > >> 90411 Nuernberg, Germany > >> Tel.: +49 1522 2894134 > >> mailto:rufus.busch...@siemens.com > >> www.twitter.com/siemens > >> > >> www.siemens.com/ingenuityforlife > >> > >> Siemens Aktiengesellschaft: Chairman of the Supervisory Board: Jim > >> Hagemann Snabe; Managing Board: Joe Kaeser, Chairman, President and Chief > >> Executive Officer; Roland Busch, Lisa Davis, Klaus > Helmrich, Janina Kugel, Cedrik Neike, Michael Sen, Ralf P. > >> Thomas; Registered offices: Berlin and Munich, Germany; Commercial > >> registries: Berlin Charlottenburg, HRB 12300, Munich, HRB 6684; > >> WEEE-Reg.-No. DE 23691322 > >> > >>> -----Ursprüngliche Nachricht----- > >>> Von: dev-security-policy > >>> <dev-security-policy-boun...@lists.mozilla.org> Im Auftrag von > >>> Jürgen Brauckmann via dev-security-policy > >>> Gesendet: Mittwoch, 23. Januar 2019 13:42 > >>> An: mozilla-dev-security-pol...@lists.mozilla.org > >>> Betreff: Incident Report DFN-PKI: Non-IDNA2003 encoded international > >>> domain names > >>> > >>> We received a report about non-idna2003 encoded international domain > >>> names. 4 certificates were affected and are revoked by > >> now. > >>> Details can be found here: > >>> https://bugzilla.mozilla.org/show_bug.cgi?id=1522080 > >>> > >>> Please also take note of the ongoing discussion regarding this topic in > >>> the CA/B Forum's Server Certificate Working Group mailing > list: > >>> https://cabforum.org/pipermail/servercert-wg/2019-January/000520.html ff. > >>> > >>> Thanks, > >>> Jürgen > >>> _______________________________________________ > >>> dev-security-policy mailing list > >>> dev-security-policy@lists.mozilla.org > >>> https://lists.mozilla.org/listinfo/dev-security-policy > > _______________________________________________ > > dev-security-policy mailing list > > dev-security-policy@lists.mozilla.org > > https://lists.mozilla.org/listinfo/dev-security-policy > > _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy