See https://cs.chromium.org/chromium/src/ios/web/net/request_tracker_impl.mm?rcl=0&l=272
if (status_.cert_status & net::CERT_STATUS_COMMON_NAME_INVALID) {
// CAs issue certificates for intranet hosts to everyone. Therefore, we
// mark intranet hosts as being non-unique.
if (IsIntranetHost(url_.host())) {
status_.cert_status |= net::CERT_STATUS_NON_UNIQUE_NAME;
}
}
It's unclear what this snippet of code is trying to do. It triggers only for certificates with mismatched names, which isn't what CERT_STATUS_NON_UNIQUE_NAME is coupled to. It then uses IsIntranetHost() vs other platforms' use of IsHostnameNonUnique() - meaning it only triggers on 'dotless' domains, rather than what other platforms do, which is on any IANA reserved name or IP.
Comment 1 by eugene...@chromium.org
, Jun 16 2016Owner: marq@chromium.org
Status: Assigned (was: Untriaged)