[Servercert-wg] Question on BR 3.2.2.6

Dimitris Zacharopoulos (HARICA) dzacharo at harica.gr
Fri Feb 28 04:18:50 MST 2020


I am not sure if this discussion continues to be related to 3.2.2.6 or 
the name constraints extension. I suggest starting a separate thread 
about discussing name constraints in the BRs.


Thanks,
Dimitris.



On 2020-02-28 12:07 μ.μ., Pedro FUENTES via Servercert-wg wrote:
> Hello,
>
> Actually Apple’s interpretation was the one I had… but I wrongly 
> assumed that “label” could be also understood as a concatenated string 
> at the left, and that it could also pass the test, while I understand 
> now that a “label” must be separated with a period of the allowed name 
> constraint...
>
> BTW, Clint, once you get into this… Has Apple solved the issue that 
> provoked that a the Name Constraints extension marked as critical was 
> giving a “non trusted” error in MacOS and iOS? In the past I think 
> this was the only case that prevented to enforce this rule of the BR 
> and the extension had to be left non-critical in order to work in 
> Apple systems… It would be good to know if this is still an issue.
>
> Thanks,
> Pedro
>
>> El 28 feb 2020, a las 0:32, Clint Wilson via Servercert-wg 
>> <servercert-wg at cabforum.org <mailto:servercert-wg at cabforum.org>> 
>> escribió:
>>
>> Hi all,
>>
>> Our interpretation of this is that a Name Constraint dNSName which 
>> contains a preceding ‘.’ /requires /one or more additional labels to 
>> match the name constraint, while a Name Constraint dNSName which 
>> contains no preceding ‘.’ allows zero or more labels.
>> For example, if a CA with a name constraint of “.example.com 
>> <http://example.com/>” issued a cert for “example.com 
>> <http://example.com/>”, valuation would fail, while a cert issued for 
>> “www.example.com <http://www.example.com/>” would pass.
>> If a CA with a name constraint of “example.com <http://example.com/>” 
>> issued a cert for “example.com <http://example.com/>”, valuation 
>> would pass, alongside a cert issued for “www.example.com 
>> <http://www.example.com/>” passing too.
>>
>> Thanks,
>> -Clint
>>
>>> On Feb 27, 2020, at 11:35 AM, Ryan Sleevi via Servercert-wg 
>>> <servercert-wg at cabforum.org <mailto:servercert-wg at cabforum.org>> wrote:
>>>
>>>
>>>
>>> On Thu, Feb 27, 2020 at 2:18 PM Corey Bonnell via Servercert-wg 
>>> <servercert-wg at cabforum.org <mailto:servercert-wg at cabforum.org>> wrote:
>>>
>>>     It’s a PKI footgun for sure, but here’s the relevant paragraph
>>>     from4.2.1.10 <http://4.2.1.10/>:
>>>
>>>     “DNS name restrictions are expressed ashost.example.com
>>>     <http://host.example.com/>. Any DNS
>>>
>>>     name that can be constructed by simply adding zero or more labels to
>>>
>>>     the left-hand side of the name satisfies the name constraint.  For
>>>
>>>     example,www.host.example.com <http://www.host.example.com/>would
>>>     satisfy the constraint but
>>>
>>>     host1.example.com <http://host1.example.com/>would not.”
>>>
>>>     A dNSName permittedSubtree value of “gov.XX” wouldn’t allow
>>>     “nogov.XX”, as the matching is done by appending zero or labels
>>>     to the dNSName and not a simple string concatenation. In other
>>>     words, “gov.XX” and “www.gov.XX <http://www.gov.xx/>” are
>>>     permitted, but “nogov.XX” is not.
>>>
>>>     As for the ACM documentation you provided, I don’t think it’s
>>>     RFC-compliant given the paragraph above. Here’s an example
>>>     (long-expired) subCA that contains incorrectly encoded
>>>     nameConstraints (due to the leading period) and cablint
>>>     complains:https://crt.sh/?id=2929505&opt=cablint,zlint.Interestingly,
>>>     zlint does not flag this error.
>>>
>>>
>>> Thanks for pointing that out, Corey. I filed 
>>> https://github.com/zmap/zlint/issues/413 for this, because as you 
>>> note, it is malformed.
>>> <image003.png>_______________________________________________
>>> Servercert-wg mailing list
>>> Servercert-wg at cabforum.org <mailto:Servercert-wg at cabforum.org>
>>> http://cabforum.org/mailman/listinfo/servercert-wg
>>
>> _______________________________________________
>> Servercert-wg mailing list
>> Servercert-wg at cabforum.org <mailto:Servercert-wg at cabforum.org>
>> http://cabforum.org/mailman/listinfo/servercert-wg
>
> *WISeKey SA
> *
> *Pedro Fuentes
> *CSO - PM eSecurity Solutions
> Office: + 41 (0) 22 594 30 00
> Mobile: + 41 (0) 791 274 790
> Address: 29, Rte de Pré-Bois - CP 853 | Geneva 1215 CH - Switzerland
> *Stay connected with WISeKey <http://www.wisekey.com>
> *
> *THIS IS A TRUSTED MAIL*: This message is digitally signed with a 
> WISeKey identity. If you get a mail from WISeKey please check 
> the signature to avoid security risks
>
> *CONFIDENTIALITY: *This email and any files transmitted with it can be 
> confidential and it’s intended solely for the use of the individual or 
> entity to which they are addressed. If you are not the named addressee 
> you should not disseminate, distribute or copy this e-mail. If 
> you have received this email in error please notify the sender
>
> *DISCLAIMER: *WISeKey does not warrant the accuracy or completeness of 
> this message and does not accept any liability for any errors or 
> omissions herein as this message has been transmitted over a public 
> network. Internet communications cannot be guaranteed to be secure or 
> error-free as information may be intercepted, corrupted, or contain 
> viruses. Attachments to this e-mail are checked for viruses; 
> however, we do not accept any liability for any damage sustained by 
> viruses and therefore you are kindly requested to check for viruses 
> upon receipt.
>
>
> _______________________________________________
> Servercert-wg mailing list
> Servercert-wg at cabforum.org
> http://cabforum.org/mailman/listinfo/servercert-wg

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20200228/8dbb6554/attachment-0001.html>


More information about the Servercert-wg mailing list