Closed
Bug 770877
Opened 12 years ago
Closed 12 years ago
Add .com, .net, .name to IDN TLD whitelist
Categories
(Core Graveyard :: Networking: Domain Lists, defect)
Core Graveyard
Networking: Domain Lists
Tracking
(Not tracked)
RESOLVED
FIXED
mozilla19
People
(Reporter: gerv, Assigned: gerv)
References
Details
Attachments
(1 file)
1.14 KB,
patch
|
Details | Diff | Splinter Review |
Verisign have emailed me to ask that .com, .net and .name be added to the whitelist.
Link to the Registry Home page:
http://verisigninc.com/en_US/products-and-services/domain-name-services/registry-services/index.xhtml
Link to the Policy Page:
http://verisigninc.com/en_US/products-and-services/domain-name-services/domain-information-center/idn-code-points/index.xhtml
Allowed Code Points as posted on IANA's IDN Repository:
http://www.iana.org/domains/idn-tables/
Homograph Policy:
http://verisigninc.com/en_US/products-and-services/domain-name-services/domain-information-center/idn-code-points/registration-rules/index.xhtml
The new criteria for addition is that their policy be at least as strict as that outlined here:
https://wiki.mozilla.org/IDN_Display_Algorithm
Verisign's policy corresponds to the first 4 things we permit:
1. Common + Inherited + any other single script; (or)
2. Common + Inherited + Latin + Han + Hiragana + Katakana; (or)
3. Common + Inherited + Latin + Han + Bopomofo; (or)
4. Common + Inherited + Latin + Han + Hangul;
They do not permit:
5. Common + Inherited + Latin + any single other script except Cyrillic, Greek, or Cherokee
Therefore, their policy is more strict than ours and they can be included in the TLD whitelist under the transitional arrangements.
Gerv
Comment 2•12 years ago
|
||
I'd argue against this for ".com" and ".net" as a security issue. If someone is trying a homograph attack, it will probably be against a name in ".com". If there are any existing incorrect names in the ".com" TLD, making them inaccessible, or at least bringing up an alert box, would be appropriate.
This would encourage the registries to clean up their act.
If Network Solutions wants this, let them provide a list of "grandfathered" bad domain names in .com and .net for public examination.
Assignee | ||
Comment 3•12 years ago
|
||
Assignee: nobody → gerv
Status: NEW → ASSIGNED
Assignee | ||
Comment 4•12 years ago
|
||
Having evaluated the situation and the public discussion, I've decided to proceed with this change.
https://hg.mozilla.org/integration/mozilla-inbound/rev/c95b9413e66e
Gerv
Comment 5•12 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla19
Comment 7•12 years ago
|
||
This change has been landed to Firefox 17 (both release and ESR channel) by Bug 802568, so now this document have to be updated:
http://www.mozilla.org/projects/security/tld-idn-policy-list.html
Assignee | ||
Comment 8•12 years ago
|
||
Done.
Gerv
Updated•9 months ago
|
Product: Core → Core Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•