Ben Bucksch wrote:
(You *may* be thinking of DV (Domain Validation) and Class 1 SSL certs. These are indeed insecure and make SSL a joke. They were a really bad idea and that is one of the reasons behind EV.)

Well, even DV certs are supposed to be only issued to the person in control of the domain. But I agree, another DNS attack at the time of certificate issuance can, perhaps, cause verification emails to go astray. Practice is not great in this area.

As far as a fix for DNS, everyone hates hearing it, but the fix is already out there no one wants to use it though

http://www.dnssec.com

Oh, and I'm sure we're taking patches for DNSSec support in Firefox. Aren't we?

Yes, and actually, SSL goes much further than DNSsec. The latter is good to prevent DNS spoofs and is much-needed, but it does nothing to protect the content.

Actually, you could protect the content by storing a certificate in a DNS record, couldn't you?

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to