-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ca certificate name constraints #1675
Conversation
d7050b2
to
c4a020e
Compare
Can you tell me a bit more about the purpose of the randomized DNS/email constraints you've implemented here? Is it just so that a constraint for NC/email exists? Also, even when IPv6 is not active a NC should be imposed for it -- you can do |
@reaperhulk I didn't want to stick to a static domain like |
Ah, okay. So you're using a permitted in all scenarios so that a NC is applied because One last question: in the latest commit a positive name constraint is set on
Based on our conversation here I expected that a |
If Here is what you'll see if the endpoint will be set to a domain:
and here is a regular cloud deployment without domain in the endpoint:
|
4ac4da2
to
d0c52a3
Compare
d0c52a3
to
d5e4964
Compare
Ah, okay, I understand now. This looks good at this point! |
This reverts commit 0efa4ea.
…its#1675) (trailofbits#1768) * relax CA constraints for client (the client equivalent of PR trailofbits#1675) * fixing incorrectly hard-coded output file path
…its#1675) (trailofbits#1768) * relax CA constraints for client (the client equivalent of PR trailofbits#1675) * fixing incorrectly hard-coded output file path
Description
pathlen:0
:Motivation and Context
The discussion initially started in #75 and rose up again in #1673
How Has This Been Tested?
Types of changes
Checklist: