Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Common Name support has been added for acme.crypto_util.make_csr() #5837

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

ZenSecurity
Copy link

@ZenSecurity ZenSecurity commented Apr 8, 2018

With help of this commit we can set "common_name" manually in make_csr(), or just use first domain from "subject_alt_names" list if "common_name" is empty.

@schoen
Copy link
Contributor

schoen commented Apr 9, 2018

Hi @ZenSecurity ,

Thanks!

Do you have a particular way that you'd like to see this functionality get used in Certbot, or another client where you would like to use it? I know users sometimes ask us about how to cause a particular name to be displayed in the CN X.509 field, so it looks like you're aiming at giving people more convenient control of that. But how do you envision that users would take advantage of this feature?

@ZenSecurity
Copy link
Author

This feature will be useful for python developers, who use bare acme library without certbot client, like i do. It will help to integrate letsencrypt more easily into complicated infrastructure.

@ohemorange
Copy link
Contributor

@schoen, looks like you're on top of reviewing this. Just wanted to point out that different clients sometimes have different behavior around when certs do an do not have a common name set and when SANs are or aren't set, so we might want to consider that when making the change to always set the common name.

@ZenSecurity
Copy link
Author

Any updates ?

Copy link
Contributor

@schoen schoen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK, that sounds fine! Would it be safer to also add a check asserting that common_name is an element of subject_alt_names?

@ZenSecurity
Copy link
Author

What do you think about backward compatibility (https://www.digicert.com/subject-alternative-name-compatibility.htm), maybe we need more accurate checks, especially for wildcards ?

@schoen schoen self-assigned this Sep 12, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants