badssl.com
badssl.com copied to clipboard
Add test for a cert signed by a non-CA certificate that's otherwise trustworthy.
That is, the hierarchy would be something like:
DigiCert Global Root CA (trusted root)
|- DigiCert SHA2 Secure Server CA (valid subordinate CA)
|- *.badssl.com (valid certificate, not a CA)
|- constraint-fail.badssl.com (would be valid, except *.badssl.com is not a CA)
You could also add a second version of the test where the third entry (the subordinate CA that isn't actually a CA) is for an entirely different domain, to be more comprehensive.
This is a neat idea!
Thanks! There's a known case of a failure to check that flag as well; thankfully it seems to only have had positive effects—see KaeruTeam/nds-constraint.