On Wed, 10 Jan 2018 15:10:41 +0100 Patrick Figel via dev-security-policy <[email protected]> wrote:
> A user on Hacker News brought up the possibility that the fairly > popular DirectAdmin control panel might also demonstrate the > problematic behaviour mentioned in your report[1]. Although arguably tangential to the purpose of m.d.s.policy, I think it would be really valuable to understand what behaviours are actually out there and in what sort of volumes. I know from personal experience that my own popular host lets me create web hosting for a 2LD I don't actually control. I had management agreement to take control, began setting up the web site and then technical inertia meant control over the name was never actually transferred, the site is still there but obviously in that case needs an /etc/hosts override to visit from a normal web browser. Would that host: * Let me do this even if another of their customers was hosting that exact site ? If so, would mine sometimes "win" over theirs, perhaps if they temporarily disabled access or due to some third criteria like our usernames or seniority of account age ? * Let me do this for sub-domains or sub-sub-domains of other customers, including perhaps ones which have a wildcard DNS entry so that "my" site would actually get served to ordinary users ? * Let me do this for DNS names that can't exist (like *.acme.invalid, leading to the Let's Encrypt issue we started discussing) ? I don't know the answer to any of those questions, but I think that even if they're tangential to m.d.s.policy somebody needs to find out, and not just for the company I happen to use. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

