Robin Alden:
> f) refers to an SSL product which is limited in such a way that it isn't
> generally usable on the public internet.  We offer no warranty on the
> product, and the main part of the domain validation is to ensure that the
> domain name in the certificate is not a valid internet name or, if the
> certificate is for an explicit IP address, that the IP address is not
> internet routable.
> 
> We do issue quite a number of these certificates, especially for use within
> enterprise organizations.
> We don't issue many to localhost in particular but we have issued some!
>

Thanks Rob for this information. I want to raise here a concern about 
this practice. I view hostname based certificates not something public 
CAs should be involved since with little knowledge an attack on those 
sites is rather easy to perform. Considering that NO validations are 
performed nor that the hostnames have to be unique (considering that you 
mentioned that you issue SOME certificates for "localhost", which is 
more than one), I suspect this to be in contradiction to the Mozilla CA 
Policy:

In http://www.mozilla.org/projects/security/certs/policy/ section 7 
explicitly states:

"for a certificate to be used for SSL-enabled servers, the CA takes 
reasonable measures to verify that the entity submitting the certificate 
signing request has registered the domain(s) referenced in the 
certificate or has been authorized by the domain registrant to act on 
the registrant's behalf"

Uniqueness of the common name field is not mentioned explicit in the 
Mozilla CA policy, but nevertheless it's industry standard that CN 
fields are unique per issuer (for server certificates). Now, issuing 
certificates for hostnames AND no uniqueness is required, I few the risk 
even higher (since the same issuer might issue the same certificates, 
one which might be used for such an attack). Please note that there is 
NO validation performed, meaning anybody literally can get a certificate 
as would be used somewhere else...

Disclaiming any warranty doesn't cut I think...than why issue them in 
first place?

Now, I suggest to Frank to review this matter seriously and to evaluate 
the risk which might be involved with hostname based certificates.

-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to