Frank Hecker wrote:

David Stutzman wrote:

This means I can't start getting amazon.com ssl certs unless I have control over one of the administrative email boxes of amazon.com


I don't want to speak for Gerv, but I don't believe he's concerned about CAcert or other CAs issuing fraudulent SSL certs for "amazon.com", he's concerned about CAs issuing SSL certs for misleading domain names like "amaz0n.com".


Yes, I'd say that is the issue.  Bear in mind that
this is *not* happening now as it is too easy to
attack without using SSL at all.  The name of the
game is to force the phishers into using SSL, in
which case the obvious attack is for phishers to
acquire amaz0n.com as a cert issued by noname.com.

I think the key issues here are as follows:

1. As a general question, can or should CAs do anything to detect requests associated with misleading domains of the type that might be associated with phishing attacks?


I think it reasonable to ask them to detect for
misleading domains amongst their own customers.

2. What (if anything) can and should we (the Mozilla project in general, and the Mozilla Foundation in particular) do with regard to this? (For example, would this warrant putting additional requirements on CAs whose certs are pre-loaded into Firefox, etc?)


In terms of requirements, I can't think of one that
a phisher would be dismayed by.  If they cared, that
is.  Even if they have trouble picking up their own
certs, about 20k boxes are hacked every month,
leading to plenty of stolen valid certs.

In this regard I've already expressed my opinion that our requiring WebTrust audits or even "strong" verification of applicants by CAs does not necessarily address the phishing problem in this context. But of course others are welcome to add their own thoughts on this...


iang

--
News and views on what matters in finance+crypto:
       http://financialcryptography.com

_______________________________________________
mozilla-crypto mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to