Closed Bug 351698 Opened 18 years ago Closed 17 years ago

Certificate mismatch warning for https://bugzilla.mozilla.org./ (note trailing dot for absolute DNS)

Categories

(Core :: Security: PSM, defect)

1.8 Branch
defect
Not set
normal

Tracking

()

RESOLVED DUPLICATE of bug 134402

People

(Reporter: bugzilla.mozilla.org, Assigned: KaiE)

References

()

Details

If I call a secure site https://www.server.com./, firefox complains that the certicate belongs to "www.server.com" and not to "www.server.com.".

"www.server.com." is the notation for an absolute address, that means no domain suffix is appended.

Assume there is a server "test.org.mycompany.com", then "http://test.org" would go to "http://test.org.mycompany.com./", but "http://test.org." goes only to "http://test.org./".
This is probably a Core bug, no?
Assignee: nobody → kengert
Component: General → Security: PSM
Product: Firefox → Core
QA Contact: general
Summary: www.server.com <> www.server.com. → Certificate mismatch warning for https://bugzilla.mozilla.org./ (note trailing dot for absolute DNS)
Version: unspecified → Trunk
I can confirm this behavior with https://bugzilla.mozilla.org./ using a Mac trunk build of Firefox.  And I agree that it seems like a bug.
I believe this is a bug in NSS, because our application module PSM brings up that mismatch dialog after NSS complains about a bad cert with error code: SSL_ERROR_BAD_CERT_DOMAIN

-> NSS
Assignee: kengert → nobody
Component: Security: PSM → Libraries
Product: Core → NSS
QA Contact: libraries
Version: Trunk → 3.11.3
No, I disagree that this is an NSS bug.  
NSS requires that SSL_SetURL be called with the string that is to match
one of the names in the cert. 
Note that DNS plays no part in that matching.  The names used for matching
might not even be DNS names as far as NSS is concerned.  
If the calling application has knowledge that the name is a DNS name, and
that the trailing dot can (and should) be stripped, the calling application
must do that.  
Assignee: nobody → kengert
Component: Libraries → Security: PSM
Product: NSS → Core
QA Contact: libraries
Version: 3.11.3 → 1.8 Branch
Thanks to Nelson for pointing me into the right direction.

I can see that PSM does forward the associated host name to NSS.
That host name is passed into PSM by Necko, at SSL socket construction time.

http://lxr.mozilla.org/seamonkey/ident?i=NewSocket
http://lxr.mozilla.org/seamonkey/ident?i=AddToSocket

Should Gecko be changed to pass in a stripped/normalized host name?

If you agree, please reassign to Gecko.
QA Contact: psm
What happens if I'm in the domain mycompany.com and I go to https://www and the certificate belongs to www.mycompany.com?
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.