I’m probably joining in the middle of this conversation, but please be patient with me:

On 19 Apr 2021, at 10:48, Eliot Lear wrote:

Hi Rich,

A few of us just had this discussion in another context.  Try this:

CAs MUST populate a SAN.
Verifiers MUST use a SAN if present.
Verifiers MUST reject certificates without a SAN by default.

I don’t understand what “by default” means here; it seems to conflict with the MUST. Of course using CN to indicate the subject of the certificate hasn’t been good practice for 10 years or so, but this requirement seems to run counter to the principle of being liberal in what you accept (with the obvious exception of things that create a security problem, but I don’t think that is the case here). What is the problem that this requirement is solving, other than eliminating a few lines in certificate verification code?

Verifiers MAY be configured to accept certificates without SANs when very long lived certificates are expected to be encountered.

This must be the exception to the previous bullet. But I would expect the requirement to be based on the issue date of the certificate, not its lifetime. How does a verifier know in advance what to expect?

Are CAs issuing certificates with freeform text in their CN fields, is that the problem?

-Jim

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to