Uploaded image for project: 'Documentation'
  1. Documentation
  2. DOCS-9180

Document required CN / subjectAltName configuration for TLS certificates

    • Type: Icon: Task Task
    • Resolution: Done
    • Priority: Icon: Major - P3 Major - P3
    • None
    • Affects Version/s: None
    • Component/s: None
    • Labels:
      None

      We often get questions from users about TLS handshake failures that are caused by misconfigured TLS certificates. The server and client drivers use the hostname verification algorithm described in RFC2818 Section 3.1, specifically this text:

      If a subjectAltName extension of type dNSName is present, that MUST
      be used as the identity. Otherwise, the (most specific) Common Name
      field in the Subject field of the certificate MUST be used. Although
      the use of the Common Name is existing practice, it is deprecated and
      Certification Authorities are encouraged to use the dNSName instead.

      Users often create TLS certificates that have a SAN dNSName of something like "foo.example.com", and a CN of something like "foobar.example.com". They try to connect to foobar.example.com and the TLS handshake fails, leading to a lot of confusion.

      TLS is complicated and difficult to explain. Let's try to give the users a fighting chance in this case.

            Assignee:
            kay.kim@mongodb.com Kay Kim (Inactive)
            Reporter:
            bernie@mongodb.com Bernie Hackett
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved:
              5 years, 39 weeks, 1 day ago