I recently encountered a web site with a certificate that chained through
two intermediate CAs to one of Mozilla's trusted roots.

This cert's Subject Alt Name (SAN) extension included:

- 43 wildcard domain names (e.g. of the form *.something.tld)
-  1 non-wildcard DNS name (of the form something.tld)
-  4 binary IP addresses (all fully routable and accessible on the Internet)
-  4 DNS name strings that were the ASCII dotted decimal form of those 8 IP
     addresses
- 12 simple host names (e.g. such as home, test, www01, www02, ... etc.)

The cert's subject name included 60 Common Name (CN=) attributes whose
attribute string values matched the 60 name strings in the SAN extension (as
if multiple CN attributes each containing a DNS name was conformant).

One of the cert's subject name OU attributes contained a string claiming
the cert was domain validated.

The 44 DNS names don't bother me any.  I'm quite willing to believe that
the issuer verified that all those domains had the same registrant.

But the 12 simple host names and the 4 routable IP addresses (each of
which appears twice) bother me.

If I go to a url such as https://12.34.56.78/ and get a page with a lock
icon claiming to be a bank or financial institution, or even a well known
merchant, what assurances has that cert actually offered me?

Likewise, if I go to https://home/ and get a "home" page for some
enterprise, what assurances have I really been offered?

Does this bother any one else ?
Should Mozilla's policy speak to any of these issues?

/Nelson
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to