On 2/20/09 12:11 PM, Nelson B Bolyard wrote:
> Benjamin Smedberg wrote, On 2009-02-19 07:39:
> 
>> It sounds to me that we could and should fix this bug simply by disabling
>> punycode for the wildcard portion.
> 
> I'm not sure what you're proposing here, Ben, or what effect you think
> it would have.

I'm proposing that when Firefox displays the domain name of a site, it
should only use punycode display for the portion of the domain name which
actually appears in the certificate. So for a wildcard cert *.ijjk.cn, the
display would be

xn--blahblahunreadablepunycode.ijjk.cn

> Homomorphic characters aren't a problem for wildcard matching.  They're a
> problem for users' eyeballs.  The attack that was demonstrated could have
> been done without wildcards.  Changing the wildcard matching rules would
> not eliminate this attack (in the general case).

I don't see how the attack could have been done without wildcards. CA
guidelines say that certificates should not be issued with homographic
characters that might cause confusion, and as far as we know these
guidelines are being followed. The attack here takes place entirely within
the wildcard portion of the domain because that's the portion the CA can't
verify when they issue the certificate.

--BDS
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to