Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My understanding is that intermediate CAs can be limited to issuing certificates only for specific domains.

Is it not possible to get a root-signed intermediate CA for someone who can prove control over a domain? This would allow you to issue certificates for "xxx.internal.mydomain.com", without the need for a wildcard certificate, and without the need for using a public CA for every individual certificate?

CT would still be a problem unless the CA could be flagged to "allow non-CT certificates", and the browser ignore those requirements as they ignore CT requirements for manually installed root certs

The benefits to this is 1) there's no need to manually install a root certificate on each client device 2) Your internal domains are not reliant on an external CA



> My understanding is that intermediate CAs can be limited to issuing certificates only for specific domains.

Technically, X.509 allows for constraining things, [1] but from a practical perspective [2] it's not really implemented.

[1] https://tools.ietf.org/html/rfc5280#section-4.2.1.10 [2] https://security.stackexchange.com/questions/31376/


That thread does indicate things are changing though and it's becoming more and more accepted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: