Skip to content

crypto/x509: enable strict domain name validation during creation and parsing #75835

@rolandshoemaker

Description

@rolandshoemaker

In https://go.dev/cl/709854 for CVE-2025-58187 we enabled strict validation of domain names in SANs and constraints. This broke a number of users as we previously allowed creation of certificates that contained these malformed domain names (see #75828 for further details), even if they would've failed verification when we got to constraint checking (if a chain contained any constraints).

We should re-enable this strict validation, but we should flag it with a GODEBUG, and we should additionally enforce it in CreateCertificate (et al).

Metadata

Metadata

Labels

LibraryProposalIssues describing a requested change to the Go standard library or x/ libraries, but not to a toolNeedsFixThe path to resolution is known, but the work has not been done.

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions