I don't understand all steps. 
You say that [email protected] receives a code (not an activation URL). So when 
he sends the code to his employee, how does the hacker get the code?

(Besides, most CAs limit the cofe validity to a few minutes, so this scenario 
is not likely to work many times)

About your long term solution:

- the idea about the flag is not bad. Maybe someone can write a RFC about it. 

- but improving the revocation process doesn't solve the actual problem you 
mentioned (the insecure validation)

- since a lot of web servers don't support OCSP stapling, the CAs would make 
their customers very, very angry, if the purchased certificate doesn't work on 
their web server. 
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to