Thorsten Becker wrote:
> Nelson Bolyard wrote:
>> On the other hand, it is possible that the domain validation was performed
>> but that it was deceived through the use of DNS attacks.  In his slides
>> on the subject of DNS attacks, Dan Kaminsky did say that it was possible
>> to deceive domain validation through DNS attacks.
> 
> I think domain validation could be deceived using DNS attacks, but in this
> case this was apparently not necessary:
> 
> http://www.networkworld.com/community/node/30822
> 
> "Michael started his talk by detailing how he was able to purchase a
> certificate from a major CA with a FQDN of an existing fortune 500
> company’s website! How you ask is this possible, well when filling out the
> request form he simply checked the box that stated that the certificate was
> not going to be used on the internet and was for internal testing only."

I'll be convinced when I see the cert and/or see the web site's enrollment
page with that feature.  There's one CA that can kiss it's place in the root
list good-bye.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to