certificates
certificates copied to clipboard
Enforce name constraints at cert issuance time
Description
Enforce name constraints on X509 cert issuance. For example, if the intermediate has:
- PermittedDNSDomains=example.com, then example.com and www.example.com will be permitted, but acme.com will not.
- ExcludedDNSDomains=example.com, then acme.com will be permitted, but example.com or www.example.com will not.
@maraino: this probably requires signing the certificate and then verifying the chain to see if it's valid, not returning the certificate if it fails? Or do you think we should extract the Go x509 implementation to do this without signing?
@hslatman I've extracted the Go code, see verify.go on #1061