Hello,

I'm just testing ssl interception and noticed the following problem. Sometimes 
the Subject/Subject Alternative Name of the cert is altered with a different 
name than the one the original cert has:

The faked cert:

#############################################################################################

X.509 Certificate Information:
    Version: 3
    Serial Number (hex): 051f332aed0c96
    Issuer: 
C=DE,ST=Saxony,L=Dresden,O=Retiolum,OU=WEB,CN=SUB_CA,EMAIL=uwe.wer...@retiolum.eu
    Validity:
        Not Before: Wed Jan 28 03:58:40 UTC 2015
        Not After: Fri Jan 29 14:31:49 UTC 2016
    Subject: C=DE,CN=blog.b1-systems.de,EMAIL=postmas...@b1-systems.de
    Subject Public Key Algorithm: RSA
    Algorithm Security Level: High (4096 bits)

...

    Extensions:
        Basic Constraints (not critical):
            Certificate Authority (CA): FALSE
        Key Usage (not critical):
            Digital signature.
            Key encipherment.
            Key agreement.
        Key Purpose (not critical):
            TLS WWW Server.
        Subject Key Identifier (not critical):
            47c3adafb6c9b8d26507975d444b07c30a85f020
        Authority Key Identifier (not critical):
            eb4234d098b0ab9ff41b6b08f7cc642eef0e2c45
        Subject Alternative Name (not critical):
-->         DNSname: blog.b1-systems.de
-->         DNSname: b1-systems.de
        Certificate Policies (not critical):
            2.23.140.1.2.1
            1.3.6.1.4.1.23223.1.2.3
                URI: http://www.startssl.com/policy.pdf
                Note: This certificate was issued according to the Class 1 
Validation requirements of the StartCom CA policy, reliance only for the 
intended purpose in compliance of the relying party obligations.
        CRL Distribution points (not critical):
            URI: http://crl.startssl.com/crt1-crl.crl
        Authority Information Access (not critical):
            Access Method: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp)
            Access Location URI: http://ocsp.startssl.com/sub/class1/server/ca
            Access Method: 1.3.6.1.5.5.7.48.2 (id-ad-caIssuers)
            Access Location URI: 
http://aia.startssl.com/certs/sub.class1.server.ca.crt
        Issuer Alternative Name (not critical):
            URI: http://www.startssl.com/
    Signature Algorithm: RSA-SHA1
#############################################################################################

The original cert:

X.509 Certificate Information:
    Version: 3
    Serial Number (hex): 0813002129d4f6
    Issuer: C=IL,O=StartCom Ltd.,OU=Secure Digital Certificate 
Signing,CN=StartCom Class 2 Primary Intermediate Server CA
    Validity:
        Not Before: Thu Sep 24 15:20:33 UTC 2015
        Not After: Sun Sep 24 23:00:39 UTC 2017
    Subject: C=DE,ST=Bayern,L=Vohburg,O=B1 Systems 
GmbH,CN=www.b1-systems.de,EMAIL=postmas...@b1-systems.de
    Subject Public Key Algorithm: RSA
    Algorithm Security Level: High (4096 bits)
        Modulus (bits 4096):

...

    Extensions:
        Basic Constraints (not critical):
            Certificate Authority (CA): FALSE
        Key Usage (not critical):
            Digital signature.
            Key encipherment.
            Key agreement.
        Key Purpose (not critical):
            TLS WWW Client.
            TLS WWW Server.
        Subject Key Identifier (not critical):
            2c6fafda29839f35c51c0ccde681e036168b10a9
        Authority Key Identifier (not critical):
            11db2345fd54cc6a716f848a03d7bef7012f2686
        Subject Alternative Name (not critical):
-->         DNSname: www.b1-systems.de
-->         DNSname: b1-systems.de
        Certificate Policies (not critical):
            2.23.140.1.2.2
            1.3.6.1.4.1.23223.1.2.3
                URI: http://www.startssl.com/policy.pdf
                Note: This certificate was issued according to the Class 2 
Validation requirements of the StartCom CA policy, reliance only for the 
intended purpose in compliance of the relying party obligations.
        CRL Distribution points (not critical):
            URI: http://crl.startssl.com/crt2-crl.crl
        Authority Information Access (not critical):
            Access Method: 1.3.6.1.5.5.7.48.1 (id-ad-ocsp)
            Access Location URI: http://ocsp.startssl.com/sub/class2/server/ca
            Access Method: 1.3.6.1.5.5.7.48.2 (id-ad-caIssuers)
            Access Location URI: 
http://aia.startssl.com/certs/sub.class2.server.ca.crt
        Issuer Alternative Name (not critical):
            URI: http://www.startssl.com/
    Signature Algorithm: RSA-SHA256
#############################################################################################

In this case the DNS name www.b1-systems.de is removed from the cert what leads 
to an error message in the webbrowser.

apu01$ dig @8.8.8.8 +short www.b1-systems.de
b1-systems.de.
84.200.69.202
apu01$ dig @8.8.8.8 +short blog.b1-systems.de
spacelords.systems.b1-systems.de.
84.200.69.202
apu01$ dig @8.8.8.8 +short b1-systems.de     
84.200.69.202
apu01$ dig @8.8.8.8 +short -x 84.200.69.202
202.192-255.69.200.84.in-addr.arpa.
spacelords.systems.b1-systems.de.
apu01$ dig @8.8.8.8 +short spacelords.systems.b1-systems.de
84.200.69.202

Maybe in this special case it's caused by reverse lookup?

Is this the intended behaviour?

Thanks for this great software and Your time!

Regards Uwe

Reply via email to