Skip to content
This repository has been archived by the owner on Nov 10, 2022. It is now read-only.

Commit

Permalink
Reveal the number of redacted labels; Change (PRIVATE) to ?
Browse files Browse the repository at this point in the history
Ticket #60.
  • Loading branch information
Rob Stradling committed Feb 18, 2015
1 parent 8ecd62c commit 82ee686
Showing 1 changed file with 8 additions and 6 deletions.
14 changes: 8 additions & 6 deletions rfc6962-bis.xml
Expand Up @@ -444,12 +444,14 @@ Validation Certificates</xref>.
</section>
<section title="Redacting Domain Name Labels in Precertificates" anchor="redacting_subdomains">
<t>
When creating a Precertificate, the CA MAY substitute one or more of
the complete leftmost labels in each DNS-ID with the literal string
<spanx style="verb">(PRIVATE)</spanx>. For example, if a certificate contains a
When creating a Precertificate, the CA MAY substitute one or more
labels in each DNS-ID with a corresponding number of
<spanx style="verb">?</spanx> labels. Every label to the left of a
<spanx style="verb">?</spanx> label MUST also be a
<spanx style="verb">?</spanx> label. For example, if a certificate contains a
DNS-ID of <spanx style="verb">top.secret.example.com</spanx>, then the
corresponding Precertificate could contain
<spanx style="verb">(PRIVATE).example.com</spanx> instead. Labels in a
<spanx style="verb">?.?.example.com</spanx> instead. Labels in a
<xref target="RFC6125">CN-ID</xref> MUST remain unredacted.
</t>
<t>
Expand Down Expand Up @@ -1396,8 +1398,8 @@ corrective action when a misissue is detected.
<section title="Redaction of Public Domain Name Labels">
<t>
CAs SHOULD NOT redact domain name labels in Precertificates such that the entirety of the domain space below the unredacted part of the domain name is not owned or controlled by a single entity
(e.g. <spanx style="verb">(PRIVATE).com</spanx> and
<spanx style="verb">(PRIVATE).co.uk</spanx> would both be problematic). Logs
(e.g. <spanx style="verb">?.com</spanx> and
<spanx style="verb">?.co.uk</spanx> would both be problematic). Logs
MUST NOT reject any Precertificate that is overly redacted but which is
otherwise considered compliant. It is expected that monitors will treat overly
redacted Precertificates as potentially misissued. TLS clients MAY reject a
Expand Down

0 comments on commit 82ee686

Please sign in to comment.