Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Catch failure for AppendCertsFromPEM #2

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Catch failure for AppendCertsFromPEM #2

wants to merge 1 commit into from

Conversation

magiconair
Copy link

go1.10 is more strict when parsing names within certificates.
The common name needs to be DNS compatible. This is a change
in behavior from go1.9 and before.

It might make sense to replace this call with the code from
@bradfitz from golang/go#23711 (comment)

go1.10 is more strict when parsing names within certificates.
The common name needs to be DNS compatible. This is a change
in behavior from go1.9 and before.

It might make sense to replace this call with the code from
@bradfitz from golang/go#23711 (comment)
@bradfitz
Copy link

bradfitz commented Feb 6, 2018

Why guess the problem? Just ParseCertificate and tell the user the actual problem with it.

@jefferai
Copy link
Member

jefferai commented Feb 6, 2018

To be clear, it's not the common name that needs to be DNS compatible. It's subject alternate names that are marked as DNS-based subject alternate names that have to be DNS compatible.

Enforcing host names is on by default for Vault's PKI support, but I think we may not be properly verifying this if using a non-DNS-compatible CN before copying that value into SANs. I've opened hashicorp/vault#3918 to track that to ensure that we do.

@hashicorp-cla
Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants