[Date Prev][Date Next]
Re: Bug in tlso_session_chkhost?
--On Wednesday, May 10, 2017 10:11 AM -0700 Quanah Gibson-Mount
RFC 6125 which in turn mentions RFC 4513.
From RFC 6125:
6.4.4. Checking of Common Names
As noted, a client MUST NOT seek a match for a reference identifier
of CN-ID if the presented identifiers include a DNS-ID, SRV-ID,
URI-ID, or any application-specific identifier types supported by the
Therefore, as I noted, the certcn is immaterial since I have a DNS: value
specified, and it is then required that the certcn be ignored. The rest
of the RFC doesn't really cover special cases like localhost. I still
see nothing in the RFC that states what's I'm doing is invalid. It does
appear to be outside of what's normally done, but that's not surprising.
RFC 6761 specifically notes that "localhost." is in fact a domain name
(Section 6.3). Therefore, my certificates are in fact correct, and the
OpenLDAP code check is indeed a bug.
Packaged, certified, and supported LDAP solutions powered by OpenLDAP: