On Friday, September 9, 2016 at 11:13:49 AM UTC-4, Han Yuwei wrote:
> 在 2016年9月9日星期五 UTC+8上午12:00:15,Stephen Schrauger写道:
> > Regarding the specific file verification method:
> > 
> > It proves you control the web server that runs under the domain. Which is 
> > more or less all that you need to prove, since a TLS certificate is 
> > designed for web security. 
> > 
> > If you don't control DNS, but you do control the web server, you 
> > essentially control the domain as far as web browsing goes, and thus you 
> > should be able to acquire a certificate for that domain. Which is probably 
> > why it is included in the Baseline Requirements as an acceptable validation 
> > method.
> 
> My concern is there could be multiple website deployed on one host. So the 
> host admin could issue a cerificate for a domain. Since the vaildate period 
> is typically 1 year or more, It's a securiry concern if domain owner have 
> changed the record but the certficate didn't revoked.

Yes, the host admin has that ability. They also have the ability to modify the 
website in general. Anytime you use a hosted service, you have to trust the 
server admins. Being able to get a certificate is the least of the website 
owner's worries.

As far as validation periods go, this is true for any certificate on any 
domain. I could get a certificate for my domain today, valid for 3 months or 3 
years, and then tomorrow transfer the domain to someone else. I still have a 
certificate, and I don't control the domain anymore. This is a non-issue, since 
nothing could feasibly prevent such a scenario.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to