Balint Balogh wrote:
> Without this security measure, any CA that has its certificates in client
> software has the power to thwart SSL/TLS security by issuing fake certificates
> claiming to belong to *.example.com servers or email addresses.

If you think they might do that, why might they not do it for other
domains your users use (e.g. their bank)?

Surely you either believe a CA is trustworthy to correctly issue
certificates for websites or it isn't?

Or are you concerned that a rogue employee at an otherwise honest CA
will have a particular wish to undermine your company and employees and
will cause a single bogus certificate to be issued as part of his
campaign to target you?

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to