-
Notifications
You must be signed in to change notification settings - Fork 110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug: .onion names are no longer prohibited by the Baseline Requirements #440
Comments
@sleevi Since this is the first time this has popped up within ZLint (as far as I know) I think I would prefer we update |
@cpu Yeah, entirely reasonable! There were definitely lots of ways to solve this, and I wasn’t sure the preference. For example, I wasn’t sure if just making this a “check for rules of .onion” instead (handling both the EV and the DV rules in one lint) made sense. My assumption was that we should try to separate out lints when EVG and BRGs have separate requirements, or when there are separate dates. Does that match your understanding? |
Yup, that sounds ideal to me 👍 Thanks for thinking this through! |
Before this change, ZLint would reject .onion names in non-EV certs via the `lint_san_dns_name_onion_not_ev_cert` lint, and if that was suppressed, then complain about the missing Tor Service Descriptor extension. As of CA/Browser Forum Ballot SC27, it's allowed for v3 onion names to appear in DV/OV/IV certificates, and the Tor Service Descriptor extension is neither required nor prohibited for these. This change corrects the Tor Service Descriptor tests to properly account for it being mandatory for EV, while optional for DV/OV/IV. This does not introduce new lints to ensure that the address is itself a well-formed V2 (if EV) or V3 (all types) address, which will come in a follow-up change. Closes zmap#440
Just reopening because I incorrectly flagged it as closing, but I split the new lint out (for v2/v3 .onion name well-formedness) |
Adds a new lint, identified as e_san_dns_name_onion_invalid, that makes sure that the .onion addresses present within a certificate are well-formed v2 or v3 addresses, according to the v2 or v3 Rendezvous specifications. Closes zmap#440
Adds a new lint, identified as `e_san_dns_name_onion_invalid`, that makes sure that the `.onion` addresses present within a certificate are well-formed v2 or v3 addresses, according to the v2 or v3 Rendezvous specifications. Closes #440
Landed in d4acbba 🎉 |
lint_san_dns_name_onion_not_ev_cert.go
has a lint that returns an error if a.onion
name appears in the SAN and the certificate is not EV.However, as of BRs 1.6.9, with the adoption of CA/Browser Forum Ballot SC27v3,
.onion
names are now permitted in BR certificates, provided they are subject to additional constraints (differing from the EV Guidelines)The following tasks are needed:
RetiredDate
that is similar to theirEffectiveDate
, or the EV-only lint be retired to 2020-03-27, the effective date they became permitted by the BRs.onion
cert existed (EV or BRs) - that is, it should have been revoked..onion
address is a:The text was updated successfully, but these errors were encountered: