Nelson Bolyard wrote:
Gerv agreed with this when he wrote:
Yes, and actually, SSL goes much further than DNSsec. The latter is
good to prevent DNS spoofs and is much-needed, but it does nothing to
protect the content.

(This was me, not Gerv, BTW.)

In fact, I have asserted many times that the ONLY way a CA can be sure of
domain validation is if the DNS for that domain is hosted by that CA.
I wouldn't say that is the only way, but it would be one very good way for
DV CAs to improve the worth of their certificates.

FYI, a good deal of GeoTrust resellers are actually hosters. Maybe that's where the huge reseller number comes from. I know my hoster, ev1servers.net, offers that in their administration web frontend for the server. In theory, that can be relatively secure - they have a direct channel to the server. They can even have the real name verified via a credit card (and the banks probably use a far stronger verification than even EV mandates).

That's the theory. In practice, that web frontend is cheap and probably terribly insecure. It's dripping with root passwords (not mine) and other stuff. A lot of support people have access to it.

This *huge* gap between theory and practice is what scares me about the EV guidelines. Esp. when "site audit" is defined as stepping into the lobby, I know who is going to perform site audits, and how. Think UPS delivery boys.

--
When responding via mail, please remove the ".news" from the email address.
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to