On Thu, 12 Oct 2023, Paul Wouters wrote:

It does strongly suggest you do not have a subjectAltName extension, and
trusting CN= is no longer considered secure.

I should clarify this:

https://datatracker.ietf.org/doc/html/rfc2818#section-3.1

   If a subjectAltName extension of type dNSName is present, that MUST
   be used as the identity. Otherwise, the (most specific) Common Name
   field in the Subject field of the certificate MUST be used. Although
   the use of the Common Name is existing practice, it is deprecated and
   Certification Authorities are encouraged to use the dNSName instead.

Mostly because of the WebPKI, and things like ACME that can authenticate
a DNS name or IP in a subjectAltName, but not the random data within a
CN=.

Also because of multiple SAN entries, the CN= is kind of losing its meaning.

In the context of enduser certificates, it is obviously still very valid
and also secure. Sorry for the confusion.

Paul
_______________________________________________
Swan mailing list
Swan@lists.libreswan.org
https://lists.libreswan.org/mailman/listinfo/swan

Reply via email to