> I don't understand all steps. You say that [email protected] receives
> a code (not an activation
> URL). So when he sends the code to his employee, how does the hacker
> get the code?

[email protected] receive:
- (first CA) the code and an URL where he have to paste the code
- (second CA) an URL where he have click on a button

So it's more likely he does the validation himself than sending the code to the 
other employee.

> - but improving the revocation process doesn't solve the actual
problem you mentioned (the insecure validation)

When you are the target of an elaborate phishing, you often realize it too 
late, when the legitimate employee see the emails for example, so improving the 
revocation is important.

> - since a lot of web servers don't support OCSP stapling, the CAs
would make their customers very, very angry, if the purchased
certificate doesn't work on their web server.

Using a CAA is a decision of the customers, and the CA could emphasis that 
requirement during the validation process
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to