Ted Wynnychenko wrote:
[...]
> I block connections based on a list from malwaredomains.com.
> A script runs nightly that downloads the list/changes, creates
> zone files, and reloads unbound/nsd.  The "blocked" zone files
> point those domains at an internal (10.0.x.x) IP address.
[...]
> From my looking, it appears that a certificate is only accepted
> by browsers with "one level" of domain wildcard present; so I am
> not sure how to get a certificate with a common name of * to be
> accepted for any/every domain.

Perhaps this is an idea: enable the v3 extensions in your
configuration file and add something like

subjectAltName = @bad_actors

[bad_actors]
DNS.1 = malware1.tld
DNS.2 = *.malware1.tld
DNS.3 = malware2.tld
DNS.4 = *.malware2.tld
...

After your nightly download from malwaredomains.com you
could add the new malware-domains to the list [bad_actors]
too and regenerate this multi-domain wildcard certificate.
This should work around the "one level" of wildcards limit
you discovered in Firefox.

As long as you use your own CA to sign (as opposed to
selfsigning) and the browser knows about the corresponding
Root Certificate there should be no problem with having a
new certificate every morning.

However, this hinges on the fact that entries in the
subjectAltName section are in fact allowed to contain
wildcards. RFC5280 [1] carefully avoids "the semantics of
subject alternative names that include wildcard characters"
so it may or may not work in different browsers.

Also, I am not sure how many entries are allowed in that
section, I suppose there is some limit somewhere. However,
perhaps it is worth a try?

--Peter Fokker

[1] https://tools.ietf.org/html/rfc5280#section-4.2.1.6
    and https://tools.ietf.org/html/rfc5280#page-38

Reply via email to