"Eric Rescorla" <[email protected]> wrote: > You've said that repeatedly, but I don't think it's convincing. > > Again, we know that two invalid certificates issued: one for > mozilla.org and one CA certificate. Please explain how this turns > into a generalized MITM attack by anybody *but* the people who hold > those private keys.
Everybody knows now how to forge a CA using MD5. Even if that CA is not using MD5 anymore, many browsers don't check revocation lists and still have the old root CA imported. So the CAs revoke the bad root CA, but it's still in the browsers and other now know as well how to forge the old, revocated root CA, which is still in many browsers. Do you understand the problem now? -- Jonathan
signature.asc
Description: PGP signature
