If anybody can outline an attack against either a valid common name when a SAN is present or attack when it is not present i'd be interested.
On Friday, February 3, 2017 at 12:04:08 AM UTC-7, PhistucK wrote:
> :S
> So who is right? Microsoft sort of says that only using commonName prevents impersonation attacks and this intent says it is sort of the other way around. :(
>
>
>
>
>
>
>
> ☆PhistucK
>
>
> On Fri, Feb 3, 2017 at 7:37 AM, <
bhu...@gmail.com> wrote:
> On Friday, 27 January 2017 19:45:39 UTC-5, Ryan Sleevi wrote:
>
> > Primary eng (and PM) emails
>
> >
rsl...@chromium.org awha...@chromium.org
>
> >
>
> >
>
> > Link to "Intent to Deprecate" thread
>
> > No deprecate thread; it's been deprecated since HTTPS was first introduced (RFC 2818) in 2000.
>
> >
>
> >
>
> > Summary
>
> > Certificates have two ways to express the domain/IP they're bound to - one which is unstructured and ambiguous (commonName), and one which is well-defined (subjectAltName). In the absence of any subjectAltNames, Chrome currently falls back to comparing the domain against the commonName, if present.
>
> >
>
> >
>
> > This proposal is to remove that fallback path; in effect, requiring a subjectAltName. Ideally, we would do this for all certificates (publicly trusted and privately trusted), but if there are concerns about compat risk, we can restrict it to publicly trusted certificates.
>
> >
>
> >
>
> > Motivation
>
> > Since 1997 (X.509v3's ratification), certificates have had two ways to express a binding to a domain name - either via the commonName attribute within the certificate's subject, or via the explicitly typed (dNSName or iPAddress) of the SubjectAlternativeName Extension.
>
> >
>
> >
>
> > Since RFC 2818 (published in 2000, first drafted in January 1998), the use of the commonName field has been considered deprecated, because it's ambiguous and untyped - that is, it might contain a human-readable name or it might be a domain name.
>
> >
>
> >
>
> > The use of the subjectAlternativeName fields leaves it unambiguous whether a certificate is expressing a binding to an IP address or a domain name, and is fully defined in terms of its interaction with Name Constraints. commonName, however, is ambiguous, and because of this, support for the commonName has been a source of security bugs - in both Chrome and the libraries it uses and within the TLS ecosystem at large.
>
> >
>
> >
>
> > Compatibility Risk
>
> > Low. RFC 2818 has deprecated this for nearly two decades, and the Baseline Requirements (which all publicly trusted CAs must abide by) has required the presence of a subjectAltName since 2012.
>
> >
>
> >
>
> > Mozilla Firefox already requires the subjectAltName for any newly issued publicly trusted certificates since Firefox 48 (
https://bugzilla.mozilla.org/show_bug.cgi?id=1245280 ).
>
> >
>
> >
>
> > Usage information
>
> > From a metrics perspective, less than .002% of publicly trusted certificate validations would require this behaviour (Net.CertCommonNameFallback minus Net.CertCommonNameFallbackPrivateCA).
>
> >
>
> >
>
> > As 1.57% of privately-trusted CA certificates rely on this behaviour (or 0.1% of all certificate validations), it may be premature to deprecate it for privately-trusted CAs; alternatively, we could remove it with an enterprise policy to allow it for a limited number of releases. Unfortunately, despite being deprecated for nearly 20 years, it's unlikely we'd be able to drive this number down (and improve the security of the ecosystem) without taking further action.
>
> >
>
> >
>
> > OWP launch tracking bug
>
> >
https://bugs.chromium.org/p/chromium/issues/detail?id=308330
>
> >
>
> >
>
> >
>
> > Entry on the feature dashboard
>
> >
https://www.chromestatus.com/feature/4981025180483584 (Apologies if I botched this; not sure how to capture "The standard says this is deprecated, and Mozilla supports deprecating")
>
>
>
> We use our MS CA for other non AD integrated applications, and we actually have the subjectAltName field disabled for any certificates that are only authenticating one domain, user, device, etc. and only have the Common Name field to verify against.
>
>
>
> There may be others in this situation as Microsoft actually recommends disabling the SubectAltName field, see this link
https://technet.microsoft.com/en-us/library/ff625722(v=ws.10).aspx
>
>
>
> Nathan
>
>
>
> --
>
> You received this message because you are subscribed to the Google Groups "Security-dev" group.
>
> To unsubscribe from this group and stop receiving emails from it, send an email to
security-dev...@chromium.org.