MoinQ:

Contents

  1. history

https://datatracker.ietf.org/doc/html/rfc6125

7.2.  Wildcard Certificates

1. history

   o  Wildcard certificates automatically vouch for any and all host
      names within their domain.  This can be convenient for
      administrators but also poses the risk of vouching for rogue or
      buggy hosts.  See for example [Defeating-SSL] (beginning at slide
      91) and [HTTPSbytes] (slides 38-40).

   o  Specifications for existing application technologies are not clear
      or consistent about the allowable location of the wildcard
      character, such as whether it can be:

      *  only the complete left-most label (e.g., *.example.com)

      *  some fragment of the left-most label (e.g., fo*.example.com,
         f*o.example.com, or *oo.example.com)

      *  all or part of a label other than the left-most label (e.g.,
         www.*.example.com or www.foo*.example.com)

      *  all or part of a label that identifies a so-called "public
         suffix" (e.g., *.co.uk or *.com)

      *  included more than once in a given label (e.g.,
         f*b*r.example.com

      *  included as all or part of more than one label (e.g.,
         *.*.example.com)

      These ambiguities might introduce exploitable differences in
      identity checking behavior among client implementations and
      necessitate overly complex and inefficient identity checking
      algorithms.

   o  There is no specification that defines how the wildcard character
      may be embedded within the A-labels or U-labels [IDNA-DEFS] of an
      internationalized domain name [IDNA-PROTO]; as a result,
      implementations are strongly discouraged from including or
      attempting to check for the wildcard character embedded within the
      A-labels or U-labels of an internationalized domain name (e.g.,
      "xn--kcry6tjko*.example.org").  Note, however, that a presented
      domain name identifier MAY contain the wildcard character as long
      as that character occupies the entire left-most label position,
      where all of the remaining labels are valid NR-LDH labels,
      A-labels, or U-labels (e.g., "*.xn--kcry6tjko.example.org").

   Notwithstanding the foregoing security considerations, specifications
   that reuse this one can legitimately encourage continued support for
   the wildcard character if they have good reasons to do so, such as
   backward compatibility with deployed infrastructure (see, for
   example, [EV-CERTS]).


CategoryDns CategoryWatch CategoryTemplate

MoinQ: RFC/6125 (last edited 2022-02-17 22:09:14 by ToshinoriMaeno)