Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Certificate verify in conscrypt is not follow RFC2818 #1145

Closed
superajun-wsj opened this issue Jun 9, 2023 · 2 comments
Closed

Certificate verify in conscrypt is not follow RFC2818 #1145

superajun-wsj opened this issue Jun 9, 2023 · 2 comments

Comments

@superajun-wsj
Copy link

If a server side's certificate with no SubjectAltNames, client side should use Common name field in the subject field. But conscrypt only check SubjectAltNames while not subject when it verifies the certificate from server side.

Per RFC 2818 section 3.1,

If a subjectAltName extension of type dNSName is present, that MUST
be used as the identity. Otherwise, the (most specific) Common Name
field in the Subject field of the certificate MUST be used. Although
the use of the Common Name is existing practice, it is deprecated and
Certification Authorities are encouraged to use the dNSName instead.

image

@prbprbprb
Copy link
Collaborator

prbprbprb commented Jun 9, 2023

RFC 2818 is over 20 years old now and the use of CN was deprecated even then, in the text you quote:

Although the use of the Common Name is existing practice, it is deprecated and Certification Authorities are encouraged to use the dNSName instead

Use of CN led to many security issues over the years and starting in 2017 all the major browsers stopped allowing its use. This was followed in 2018 by okhttp, Android and Conscrypt all dropping support for CN.

@superajun-wsj
Copy link
Author

got it, thank you very much!!!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants