Robin Alden:
> Eddy Nigg said:
>> In http://www.mozilla.org/projects/security/certs/policy/ section 7
>> explicitly states:
>>
>> "for a certificate to be used for SSL-enabled servers, the CA takes
>> reasonable measures to verify that the entity submitting the certificate
>> signing request has registered the domain(s) referenced in the
>> certificate or has been authorized by the domain registrant to act on
>> the registrant's behalf"
> [Robin said...] 
> It does state exactly that, and its fine and dandy as far as it goes.  
> It does not say exactly what a "domain" is in this context.

Well, we all know what a domain is....

> Is it the intention to prohibit trusted SSL certificates for IP addresses?

I think an IP address is almost on the same level as a domain name, but 
even here there can be problems. For example if you are willing to 
validate dynamic assigned IP addresses, than this can be actively 
exploited obviously. An assigned IP may belong to somebody else within a 
few hours difference only and then what?

> Is it the intention to prohibit trusted SSL certificates for private host
> names which are not resolvable through DNS on the public internet?

They can be easily replaced by real domain names as in my previous 
example (server.intern.domain.com). In my opinion there is no 
justification to use (and secure) hostname based servers.

> It's not standard in my industry.  Serial numbers, yes, common names, no.

In other words, Comodo would issue multiple certificates for the very 
same domain name? You could have multiple valid certificates for 
www.mozilla.com?

And with your case of hostnames, we can have multiple certificates like 
server1 owned by different subscribers? That's interesting...

-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to