There was one site I work with a bit that I remembered used Thawte  
certificates so I connected to see what it does. Does not look like it  
uses SAN.

FluffyMac30-2.local:tmp 69% openssl s_client -connect mail.google.com: 
443 -showcerts > & foo.pem
^C
FluffyMac30-2.local:tmp 70% openssl x509 -in foo.pem -text -noout
Certificate:
     Data:
         Version: 3 (0x2)
         Serial Number:
             78:62:5d:1b:e6:6e:2e:b0:19:80:fc:0f:e3:da:98:51
         Signature Algorithm: sha1WithRSAEncryption
         Issuer: C=ZA, O=Thawte Consulting (Pty) Ltd., CN=Thawte SGC CA
         Validity
             Not Before: May  3 15:34:58 2007 GMT
             Not After : May 15 17:24:01 2008 GMT
         Subject: C=US, ST=California, L=Mountain View, O=Google Inc,  
CN=mail.google.com
         Subject Public Key Info:
             Public Key Algorithm: rsaEncryption
             RSA Public Key: (1024 bit)
                 Modulus (1024 bit):
                     00:c9:d4:b9:d2:d4:84:7b:f7:72:9c:b4:03:8e:ca:
                     df:ca:0e:60:af:42:78:7f:77:50:cc:c7:d5:00:3f:
                     15:8c:30:85:1a:dc:12:44:23:c1:2a:dd:74:da:85:
                     44:b0:49:32:ff:8a:58:a1:5b:31:b4:f3:31:24:7a:
                     f5:54:02:24:9d:ba:70:a4:8e:83:de:61:86:e2:2c:
                     45:fe:98:f0:c4:5f:ca:75:8a:e2:77:ee:9f:cb:9b:
                     17:c2:1f:2d:f2:12:7e:bc:d3:5f:cf:e7:c3:c8:e6:
                     b4:bd:33:68:d3:52:09:95:ac:e9:43:73:a6:d9:0a:
                     d3:ce:6d:44:ed:8a:a1:e6:79
                 Exponent: 65537 (0x10001)
         X509v3 extensions:
             X509v3 Extended Key Usage:
                 TLS Web Server Authentication, TLS Web Client  
Authentication, Netscape Server Gated Crypto
             X509v3 CRL Distribution Points:
                 URI:http://crl.thawte.com/ThawteSGCCA.crl

             Authority Information Access:
                 OCSP - URI:http://ocsp.thawte.com
                 CA Issuers - 
URI:http://www.thawte.com/repository/Thawte_SGC_CA.crt

             X509v3 Basic Constraints: critical
                 CA:FALSE
     Signature Algorithm: sha1WithRSAEncryption
         d4:9a:d2:a2:50:81:09:d7:5e:99:52:05:fc:5c:e1:1a:c3:75:
         79:31:40:d0:9c:20:cc:bf:83:e2:ee:b9:51:af:8f:7a:ac:cc:
         9e:b1:b4:f3:ea:d0:3b:0c:e0:35:93:c8:ea:57:7a:23:15:42:
         43:61:a4:0d:4f:15:51:19:37:d2:f5:36:e9:6b:9c:07:e2:26:
         4b:ea:42:dc:43:52:4a:69:62:07:a5:35:09:27:2e:d9:02:f8:
         03:5a:75:b0:67:73:f9:b3:9e:a2:f7:70:d9:70:0e:ad:06:0c:
         30:25:d3:d2:12:59:fb:e6:d3:52:1a:e2:8f:1a:a4:69:27:51:
         78:f5
FluffyMac30-2.local:tmp 71%

I poked a few other sites to see what they do
verisign.com
www.thawte.com
www.entrust.com
www.geotrust.com
www.comodo.com/
cisco.com
microsoft.com
nist.gov
nsa.gov

They all had one thing in common - no SAN. I realize this has nothing  
to do with if one could get a certificate with SAN or not - only a  
sample (not random) of what people who hopefully know about  
certificates are doing.

The funniest thing I found was that https://www.whitehouse.gov/ and 
https://www.gov.cn/ 
  were both signed with the *same* certificate. Seriously, I could not  
make this up if I tried. (for me, both were severed by  
a248.e.akamai.net). Again no SAN.

So this is a pretty adhoc selection but my point is simple - if these  
people are not using certificates with SAN, how long do we expect  
before most the certificates people are using for their web servers  
use SAN? Our goals with SIP has for a long time been that  it is  
possible to use the same certificate you already have for your web  
server and just use it to secure SIP.

One site I know of that does have SAN is cacert.org but I suspect that  
is only because I worked with them to get that working.   It also  
seems that digicert.com can provide certificate with at least a SAN  
name of DNS type but less clear if I they can add a URI. The only  
other site I found in my limited poking that had a SAN was godaddy.com  
- once again proving they are the CA with the best names.

Exchange Server 2007 can take advantage of SAN and I expect to see  
more people using them because of this. Perviously some CAs had  
offered SAN in certificates call  Microsoft Small Business Server  
certificates but last time I tried these (long ago) I could not get  
one that worked with a SIP URI.

Some old market share data is at 
http://news.netcraft.com/archives/2003/04/09/netcraft_ssl_survey.html

A few years back, I got the market share data of major CAs, went down  
the top four and tried to get them to sign a CSR with SIP URI in the  
SAN. I failed to get anything that worked. One of the CAs worked with  
me to try and resolve this and we got a test cert signed but they were  
unwilling to offer it as a service due to the small size of the  
market. Ideally someone (not me) would try this again and see if the  
stuff Microsoft has been doing has made it easier to get certs with  
SAN now than it was then.

Another nice test would be to randomly choose some domain names and  
look at their https certificate and see if it using SAN to get an idea  
of what the current deployment is like.

Cullen <with my individual contributor hat on>



On Mar 26, 2008, at 12:52 PM, Vijay K. Gurbani wrote:
> Eric Rescorla wrote:
>> So, I have no brief for one design or the other, but I think
>> we can agree that it's imperative that this work with certs
>> from commodity CAs. Has someone published a survey of which
>> CAs will give you SAN?
>
> Ekr: I don't know of a survey, but anecdotally speaking, at least
> Thawte does.  I have a freebie certificate from Thawte for
> email signing.  It has a couple of my identities in SAN:
>
> [osiris:/u/vkg]$ x509 -noout -in vkg-Thawte-SAN.pem -text
> Certificate:
>     Data:
>         Version: 3 (0x2)
>         Serial Number:
>             15:8d:ec:ff:b9:06:bf:76:49:7b:29:d6:e5:df:61:b8
>         Signature Algorithm: sha1WithRSAEncryption
>         Issuer: C=ZA, O=Thawte Consulting (Pty) Ltd., CN=Thawte
> Personal Freemail Issuing CA
> ...
>        X509v3 extensions:
>             X509v3 Subject Alternative Name:
>                 email:[EMAIL PROTECTED], email:[EMAIL PROTECTED]
>             X509v3 Basic Constraints: critical
>                 CA:FALSE
>
> Thanks,
>
> - vijay
> -- 
> Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
> 2701 Lucent Lane, Rm. 9F-546, Lisle, Illinois 60532 (USA)
> Email: [EMAIL PROTECTED],bell-labs.com,acm.org}
> WWW:   http://www.alcatel-lucent.com/bell-labs
> _______________________________________________
> Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
> This list is for NEW development of the core SIP Protocol
> Use [EMAIL PROTECTED] for questions on current sip
> Use [EMAIL PROTECTED] for new developments on the application of sip

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to