+
Skip to content

crypto/x509: enable strict domain name validation during creation and parsing #75835

@rolandshoemaker

Description

@rolandshoemaker

In https://go.dev/cl/709854 for CVE-2025-58187 we enabled strict validation of domain names in SANs and constraints. This broke a number of users as we previously allowed creation of certificates that contained these malformed domain names (see #75828 for further details), even if they would've failed verification when we got to constraint checking (if a chain contained any constraints).

We should re-enable this strict validation, but we should flag it with a GODEBUG, and we should additionally enforce it in CreateCertificate (et al).

Metadata

Metadata

Labels

LibraryProposalIssues describing a requested change to the Go standard library or x/ libraries, but not to a toolNeedsFixThe path to resolution is known, but the work has not been done.

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions

    点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载