On Fri, Apr 21, 2006 at 02:11:39PM -0500, Vijay K. Gurbani wrote:

> Victor Duchovni wrote:
> >The usual interpretation seems to be not an alternative in the sense
> >of "one more of the same", but rather "one more and possibly better
> >*representation* of the same".
> >
> >The subject name in the certificate is an X.500 DN. What Internet
> >applications that want to authenticate a connection to a given host are
> >trying to verify is a DNS name. The convention for overloading CommonName
> >in X.500 DNs as candidate DNS names is a transitional hack. When DNS
> >names are present in the SubjectAlternativeName extension, these (with RFC
> >blessing) are taken to represent *ALL* the valid DNS names of the subject.
> >
> >I don't have an RFC reference for such an interpretation. Anyone have
> >a handy reference?
> 
> RFC 3280, Section 4.2.1.7.

I read this, but it was far less clear than the HTTPS language:

   4.2.1.7  Subject Alternative Name

   The subject alternative names extension allows additional identities
   to be bound to the subject of the certificate.  Defined options
   include an Internet electronic mail address, a DNS name, an IP
   address, and a uniform resource identifier (URI).  Other options
   exist, including completely local definitions.  Multiple name forms,
   and multiple instances of each name form, MAY be included.  Whenever
   such identities are to be bound into a certificate, the subject
   alternative name (or issuer alternative name) extension MUST be used;
   however, a DNS name MAY be represented in the subject field using the
   domainComponent attribute as described in section 4.1.2.4.

   Because the subject alternative name is considered to be definitively
   bound to the public key, all parts of the subject alternative name
   MUST be verified by the CA.

   Further, if the only subject identity included in the certificate is
   an alternative name form (e.g., an electronic mail address), then the
   subject distinguished name MUST be empty (an empty sequence), and the

   subjectAltName extension MUST be present.  If the subject field
   contains an empty sequence, the subjectAltName extension MUST be
   marked critical.

The text: 

   Whenever such identities are to be bound into a certificate, the subject
   alternative name (or issuer alternative name) extension MUST be used;
   however, a DNS name MAY be represented in the subject field using the
   domainComponent attribute as described in section 4.1.2.4.

is rather muddy... Used by whom? For what? In addition? Instead? So
perhaps the HTTPS RFC elaborates the intent of a rather poorly worded
base RFC.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to