URLs with trailing dots in host names (FQDN) produce cert name mismatches
Categories
(NSS :: Libraries, defect)
Tracking
(Not tracked)
People
(Reporter: ed, Unassigned)
References
Details
(Whiteboard: [kerh-ehz][psm-policy])
Comment 1•23 years ago
|
||
Comment 2•23 years ago
|
||
Comment 3•23 years ago
|
||
Comment 4•23 years ago
|
||
Comment 5•23 years ago
|
||
Updated•20 years ago
|
Updated•18 years ago
|
Updated•18 years ago
|
Updated•18 years ago
|
Comment 8•18 years ago
|
||
Comment 9•18 years ago
|
||
Comment 10•18 years ago
|
||
Comment 11•18 years ago
|
||
Updated•16 years ago
|
Updated•15 years ago
|
Comment 15•15 years ago
|
||
Comment 17•13 years ago
|
||
Comment 18•13 years ago
|
||
Comment 19•12 years ago
|
||
Comment 20•12 years ago
|
||
Comment 21•12 years ago
|
||
Comment 22•11 years ago
|
||
Comment 23•11 years ago
|
||
Comment 24•11 years ago
|
||
Comment 25•11 years ago
|
||
Comment 26•11 years ago
|
||
Comment 27•11 years ago
|
||
Comment 28•11 years ago
|
||
Comment 29•11 years ago
|
||
Comment 32•11 years ago
|
||
![]() |
||
Updated•11 years ago
|
Comment 33•11 years ago
|
||
Comment 34•11 years ago
|
||
Comment 35•11 years ago
|
||
Comment 36•11 years ago
|
||
Comment 37•10 years ago
|
||
Comment 38•10 years ago
|
||
Comment 39•10 years ago
|
||
Comment 40•10 years ago
|
||
Updated•5 years ago
|
Comment 42•5 years ago
|
||
jfyi, taking advantage of this, reddit users seem to cancel paywalls.
https://gigazine.net/gsc_news/en/20200611-dot-host-error/
https://www.reddit.com/r/webdev/comments/gzr3cq/fyi_you_can_bypass_youtube_ads_by_adding_a_dot/
WONTFIX is ok, but if this is not our bug any longer, YouTube, New York Times, Washington Post etc. have to fix their bug.
Comment 43•5 years ago
|
||
I think it is a really strange attitude of the dev-team to just close a bug with at least some security implications without a comment. Particularly strange to me is that Mozilla now stops implementing relevant RFCs. From day to day there seem to be less reasons to support a non-chrome browser if Mozilla's aim is just to mimick broken Chrome behaviour...
![]() |
||
Comment 44•5 years ago
|
||
Perhaps "worksforme" would be more accurate. https://example.com. works just fine.
Comment 45•5 years ago
|
||
(In reply to riedel from comment #43)
I think it is a really strange attitude of the dev-team to just close a bug with at least some security implications without a comment.
You're right, sorry, I should have closed this as WORKSFORME with a comment: We were closing out bugs filed more than ten years ago that were obviously fixed, and NSS has no shortage of >15-year-old long-since-relevant bugs.
As I understand it, the purpose of this bug to normalize dNSName
labels to ignore trailing dots/label separators, which mozilla::pkix
has done since 2014, as a step before doing certificate matching (see MatchPresentedDNSIDWithReferenceDNSID
from https://searchfox.org/nss/rev/3f6454c9f55d56d56ebdb035ab8e0fcb0883472c/lib/mozpkix/lib/pkixnames.cpp#1056).
Reverting that long-standing behavior certainly can lead to additional breakage. At this point we'd need to try and fall-back to the host without the trailing dot, when one is requested. If we want to consider that, it should be its own bug in Security: PSM rather than NSS.
Comment 46•5 years ago
|
||
Thx for commenting so quickly: Makes at least more sense!!
I remember it was far more broken some time ago and it works now for most sites. So actually I am quite happy with that fact. I was just irritated how bugs are closed without comments.
However, to be clear: the original reported bug is not yet handled: Exceptions for https://self-signed.badssl.com/and https://self-signed.badssl.com./ are still handled differently. But to be fair, this is not what the title of the bug suggests and this is really an edge case.
I also would leave it like this after rethinking it: Cookie handling etc is also "broken" so it is not really a NSS bug anymore (many webserver configurations like bugzilla are also broken wrt)
Description
•