Replies: 8 comments
-
That flag is called out specifically in the documentation. TMC will globally block certificate issuance if that flag is enabled. docs.tamemycerts.com 4.19 Denying certificate requests for insecure combinations |
Beta Was this translation helpful? Give feedback.
-
Hi, |
Beta Was this translation helpful? Give feedback.
-
I think 4.8 and 5.3.1 in the docs will serve as evidence but the answer is yes. Sent from my Galaxy
-------- Original message --------From: ldc-2024 ***@***.***> Date: 8/22/24 01:51 (GMT-07:00) To: Sleepw4lker/TameMyCerts ***@***.***> Cc: JerboaGobi ***@***.***>, Comment ***@***.***> Subject: Re: [Sleepw4lker/TameMyCerts] About EDITF_ATTRIBUTESUBJECTALTNAME2 flag (Discussion #30)
Hi,
Thank you for your quick replay.
can TMC use the Supplementing DNS Names and IP Addresses feature in combination with the “san” request attribute?
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you commented.Message ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
EDITF_ATTRIBUTESUBJECTALTNAME2 is a global flag, which means it allows any requestor to get any certificate content issued for any certificate template. In most cases, this is a direct invitation for a privilege escalation up to Domain Administrator. The flag should therefore never be enabled. This is why I decided to deny requests for this combination (flag enabled and "san" attribute set) globally. The underlying issue is that you have certificate requests that do not contain a SAN but the issued certificate must have one for the application to work (usually browsers enforcing RFC 2818). So what you want to achieve is usually add a SAN to a CSR not containing it. The challenge here is that you cannot modify the original request wihout invalidating its signature. However, there are secure ways to achieve the goal:
Cheers |
Beta Was this translation helpful? Give feedback.
-
Hi, Thanks! |
Beta Was this translation helpful? Give feedback.
-
Sorry, there was a technical issue on my blog which is now fixed. Sorry for the inconvenience. |
Beta Was this translation helpful? Give feedback.
-
all good! :) |
Beta Was this translation helpful? Give feedback.
-
Hello, as I said and outlined in the blog, you should never use the "san" attribute but instead use a secure method to add a SAN to a certificate request. |
Beta Was this translation helpful? Give feedback.
-
We are seeing certificates being denied because EDITF_ATTRIBUTESUBJECTALTNAME2 flag is configured even when there is no policy file for the template. is this expectable?
From documentation, one template should be affected by this module if there is no policy file assigned.
Beta Was this translation helpful? Give feedback.
All reactions