Frank Hecker:
> Eddy Nigg (StartCom Ltd.) wrote:
>   
>> Issuing certificates which claim to be validated without such vetting 
>> ever having performed is tantamount to KNOWINGLY and WILLINGLY 
>> contribute to a possible fraud. I claim that issuing wild card 
>> certificates without proper vetting as described above equals the same.
>>     
>
> I don't have much to add to Nelson's comments, so I'm just going to 
> summarize my opinion on the issue of wildcard certs and domain 
> validation: Your points about the potential for fraud are well-taken, as 
> is your point about having an identified entity to pursue in the event 
> of fraud. 
OK
> However as I see it these points apply equally as well to 
> vanilla DV certs (i.e., for a single domain name) as they do to wildcard 
> DV certs.
>   
Not really. Let me try this again with an example (wearing my obligatory 
costume as envisioned by Nelson ;-) ).

Subscriber requests a certificate for paypal.domain.com.

Would such a SSL secured site for this specific domain foul many 
visitors?   [yes]
Does this domain name present a potential risk?   [yes]
Does the CA know upfront about its potential (mis)use?   [yes]
Can the CA intervene in the process before issuing a certificate for 
this domain?   [yes]
Can the CA visit the corresponding site and verify its content?   [yes]
Can the CA revoke the certificate immediately?   [yes]


However now the subscriber requests a certificate for *.domain.com:

Can such a certificate be potentially used to foul many visitors?   [yes]
Can the domain name present a potential risk?   [yes]
Does the CA know upfront about its potential (mis)use?   [no, there is 
none at this stage]
Can the CA intervene in the process before issuing a certificate for 
this domain?   [no, there is no reason to intervene]
Can the CA visit the corresponding site and verify its content?   [no, 
it doesn't know which sub domain will be potentially used and when]
Can the CA revoke the certificate immediately?   [no, only after a fraud 
has been committed already and brought to the attention of the CA]

The points above don't equally apply! IV reduces the risk greatly for 
wild card certificates, compared to DV only.

> When we created our CA policy the rough consensus was that DV certs have 
> a valid place in the grand scheme of things. 
Correct, we have agreed on that already.
> Given that, I think 
> wildcard DV certs are just as valid.
I don't agree, see above. They are only technically valid, but of course 
you can disagree with me.
>  Such certs may not be suitable for 
> legitimate ecommerce purposes, but that's what EV certs are for.
IV/OV certificate may be legitimate as well. It's the standard applied 
and distinction in the browser which makes them different. :-)

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to