▲ | p_ing 2 days ago | ||||||||||||||||
Did browsers ever strictly require a SAN; they certainly didn't even as of ~10 years ago? Yes, it is "required", but CN only has worked for quite some time. I find this tricks up some IT admins who are still used to only supplying a CN and don't know what a SAN is. | |||||||||||||||||
▲ | tialaramex 2 days ago | parent [-] | ||||||||||||||||
> Did browsers ever strictly require a SAN; Yes, all the popular browsers require this. > they certainly didn't even as of ~10 years ago? That's true, ten years ago it was likely that if a browser required this they would see unacceptably high failure rates because CAs were non-compliant and enforcement wasn't good enough. Issuing certs which would fail PKIX was prohibited, but so is speeding and yet people do that every day. CT improved our ability to inspect what was being issued and monitor fixes. > Yes, it is "required", but CN only has worked for quite some time. No trusted CA will issue "CN only" for many years now, if you could obtain such a certificate you'd find it won't work in any popular browser either. You can read the Chromium or Mozilla source and there just isn't any code to look in CN, the browser just parses the SANs. > I find this tricks up some IT admins who are still used to only supplying a CN and don't know what a SAN is. In most cases this is a sign you're using something crap like openssl's command line to make CSRs, and so you're probably expending a lot of effort filling out values which will be ignored by the CA and yet not offered parameters you did need. | |||||||||||||||||
|