Florian Weimer:
> * Eddy Nigg:
>
>   
>> The CAs should prevent issuance of certificates which are suspected to 
>> be used for phishing attempts and other fraud. This includes cases like 
>> real domain names (mic0s0ft.com, paypa1.com) and sub domain names 
>> (paypal.nelson.com).
>>     
>
> Is there any CA which is part of the browser PKI which actually does
> this?
>
>   
Yes! I can point you to this [1] article which mentions:

"Geotrust has a rigorous process in place to check for phishy 
certificate requests that relies on algorithms which check cert requests 
for certain words, misspellings or phrases that may indicate a phisher 
is involved."

Incidentally as you can read in the article, the system failed and a 
certificate was issued wrongfully.

Also StartCom has a similar system deployed which performs various 
checks - including check with third party sources, before the issuance 
of any certificate and post checks are performed as well. I guess these 
are not the only examples. I happened to read enough CPSs of CAs which 
mention this explicitly for reasons of non-issuance and/or revocation of 
certificates.


[1] 
http://blog.washingtonpost.com/securityfix/2006/02/the_new_face_of_phishing_1.html

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to