On Sun, Jun 8, 2008 at 6:54 PM, Nelson B Bolyard <[EMAIL PROTECTED]> wrote:
>
> I recently encountered a web site with a certificate that chained through
> two intermediate CAs to one of Mozilla's trusted roots.
>
> This cert's Subject Alt Name (SAN) extension included:
>
> - 43 wildcard domain names (e.g. of the form *.something.tld)
> -  1 non-wildcard DNS name (of the form something.tld)
> -  4 binary IP addresses (all fully routable and accessible on the Internet)
> -  4 DNS name strings that were the ASCII dotted decimal form of those 8 IP
>     addresses
> - 12 simple host names (e.g. such as home, test, www01, www02, ... etc.)
>
> The cert's subject name included 60 Common Name (CN=) attributes whose
> attribute string values matched the 60 name strings in the SAN extension (as
> if multiple CN attributes each containing a DNS name was conformant).
>
> One of the cert's subject name OU attributes contained a string claiming
> the cert was domain validated.
>
> The 44 DNS names don't bother me any.  I'm quite willing to believe that
> the issuer verified that all those domains had the same registrant.
>
> But the 12 simple host names and the 4 routable IP addresses (each of
> which appears twice) bother me.
>
> If I go to a url such as https://12.34.56.78/ and get a page with a lock
> icon claiming to be a bank or financial institution, or even a well known
> merchant, what assurances has that cert actually offered me?
>
> Likewise, if I go to https://home/ and get a "home" page for some
> enterprise, what assurances have I really been offered?
>
> Does this bother any one else ?

There is a bug on certs containing unqualified host names:
https://bugzilla.mozilla.org/show_bug.cgi?id=401317

Wan-Teh
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to