-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
* not allowed in general names #2054
Comments
I'm not entirely sure how to resolve this short of just excluding a name from the IDNA decode if there's a * in it. Ideas? |
Presumaebly in |
Yeah, I think so. |
This isn't actually fixed, we just added a vector. |
Hey, I'm wondering why you IDNA-decode at all here. The cert's subject CN won't be IDNA decoded, so it's a little inconsistent. When doing rudimentary validity checking on whether a cert matches a domain, the caller will be given an IDNA (ASCII but returned as a Python 3 |
If you attempt to parse a DNS name from a certificate SAN that contains a wildcard (e.g.
*.cryptography.io
) you get an IDNA InvalidCodePoint when it should successfully parse.The text was updated successfully, but these errors were encountered: