Open Bug 921127 Opened 11 years ago Updated 10 months ago

In PSM don't provide EV treatment when cert includes wildcards in the alt-dns name and common name fields

Categories

(Core :: Security: PSM, enhancement, P3)

enhancement

Tracking

()

People

(Reporter: kathleen.a.wilson, Unassigned)

References

(Blocks 1 open bug, )

Details

(Whiteboard: [psm-backlog])

Attachments

(3 files)

As per the EV Guidelines: 
8.1.1 Subject Organization Information
(2) Domain Name
Certificate field: subject:commonName (OID: 2.5.4.3) or subjectAltName:dNSName
Contents: This field MUST contain one or more host Domain Name(s) owned or controlled by the Subject and to be associated with the Subject‟s server. Such server MAY be owned and operated by the Subject or another entity (e.g., a hosting service). Wildcard certificates are not allowed for EV Certificates.

Please add code to PSM to not allow EV treatment of wildcard certs.
(In reply to Kathleen Wilson from comment #0)
> Please add code to PSM to not allow EV treatment of wildcard certs.

That's just one of the checks I already listed in bug 470926 (today's EV Guidelines section 8 was section 6 at that time).

Is there a specific incident (i.e., a certificate issued by an EV-enabled CA which includes a wildcard) which is triggering this request right now? If so, can we see that certificate?
Ok, here is this certificate (in case it should soon disappear from the iag-moodle.cclearning.accenture.com site).

Verizon Business got EV treatment for the Cybertrust Global Root with bug 493259 (EV OID 1.3.6.1.4.1.6334.1.100.1).
The certificate is unrevoked as of today (attaching CRL #9672, updated 2013-09-27 01:17:19 UTC, retrieved from http://crl.omniroot.com/SureServerEV.crl, for documentation purposes).

Note that the certificate doesn't include an OCSP URI either, so PSM/NSS must rely on the CRL in this case.

Funny how Netcraft puts it: "Verizon Business has chosen to test browsers' approach to wildcard EV certificates"...
Still unrevoked as of today (CRL #9692 was issued 2 October 2013 at 01:29:08 UTC). A few more bits have been posted at https://groups.google.com/d/msg/mozilla.dev.security.policy/zgXqG_P3RIg/_y91fpknjucJ.
After bug 1063281 is fixed, it will be easy to modify that new function to take an input parameter indicating whether wildcards should be matched, or similar.
Depends on: 1063281
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: