Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forbid wildcard certs for non .onion EVs #641

Merged
merged 3 commits into from
Oct 17, 2021
Merged

Forbid wildcard certs for non .onion EVs #641

merged 3 commits into from
Oct 17, 2021

Conversation

christopher-henderson
Copy link
Member

@christopher-henderson christopher-henderson commented Oct 16, 2021

This lint implements CABF EV Guidelines 1.7.8 Section 9.8.1 which states that...

Wildcard certificates are not allowed for EV Certificates (appendix F, except for those with .onion as the TLD)

The one corpus certificate that was an error was this Camerfirma certificate which is indeed an EV wildcard.

This change address #634 as reported by @mimi89999.

}

func (l *EvNotWildCard) Execute(c *x509.Certificate) *lint.LintResult {
names := append(c.GetParsedDNSNames(false), c.GetParsedSubjectCommonName(false))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you need to add the subject common name here, given it should be a name in the DNS names? I thought I understood your remarks on the other PR to be that it’s reasonable to ignore/skip adding.

Copy link
Member Author

@christopher-henderson christopher-henderson Oct 16, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Which one? Not the case sensitivity one? My only point there was that the casing of the input into ToUnicode does indeed affect it's output and not anything to do specifically with the case insensitivity of DNS in general (but you must mean a different review because I can't see the relation to this one).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oops, sorry, that was BJ and Corey - #635 (comment)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants