|
Message-ID: <52139C03.3050400@suse.de> Date: Tue, 20 Aug 2013 18:40:35 +0200 From: Ludwig Nussel <ludwig.nussel@...e.de> To: Florian Weimer <fweimer@...hat.com> Cc: oss-security@...ts.openwall.com Subject: Re: X.509 name constraints and potential interpretation conflict Florian Weimer wrote: > NSS CA roots are widely reused, but the implementation deviates from > RFC 5280 in such a way that NSS can safely accept additional root > certificates as long as they have name constraints. I think this is a > bug in RFC 5280, and the fix in NSS is sound, but it could still > result in surprising behavior if the root store is used unfiltered > with TLS implementations that lack this bug fix. > > For reference, here is the RFC 5280 errata I submitted: > > -------------------------------------- > Type: Technical > Reported by: Florian Weimer <fweimer@...hat.com> > > Section: 4.2.1.10 > > Original Text > ------------- > DNS name restrictions are expressed as host.example.com. Any DNS > name that can be constructed by simply adding zero or more labels to > the left-hand side of the name satisfies the name constraint. For > example, www.host.example.com would satisfy the constraint but > host1.example.com would not. > > > Corrected Text > -------------- > [Add this to the paragraph] > > If an implementation extracts DNS names from the subject > distinguished name, DNS name restrictions MUST be applied > to these names as well. Do you have an idea in mind how to do that in practice? E.g with openssl? Checking name constraints and the logic of verifying server identifiers is at different layers there. Ie openssl makes sure certificate name constraints on subjAltNames are applied but the special interpretation of the CN as host name is left to the applications unfortunately. An alternative approach would be to disallow that legacy CN interpretation as host name in chains that use name constraints. cu Ludwig -- (o_ Ludwig Nussel //\ V_/_ http://www.suse.de/ SUSE LINUX Products GmbH, GF: Jeff Hawn, Jennifer Guild, Felix Imendörffer, HRB 16746 (AG Nürnberg)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.