On Fri, Apr 21, 2006 at 12:24:10PM -0400, Victor Duchovni wrote:

> The subject name in the certificate is an X.500 DN. What Internet
> applications that want to authenticate a connection to a given host are
> trying to verify is a DNS name. The convention for overloading CommonName
> in X.500 DNs as candidate DNS names is a transitional hack. When DNS
> names are present in the SubjectAlternativeName extension, these (with RFC
> blessing) are taken to represent *ALL* the valid DNS names of the subject.
> 
> I don't have an RFC reference for such an interpretation. Anyone have
> a handy reference?

Here we go: RFC 2818 section 3.1:

    If a subjectAltName extension of type dNSName is present, that MUST
    be used as the identity. Otherwise, the (most specific) Common Name
    field in the Subject field of the certificate MUST be used. Although
    the use of the Common Name is existing practice, it is deprecated and
    Certification Authorities are encouraged to use the dNSName instead.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to