Eddy Nigg wrote:
> Gervase Markham:
>>
>> Exactly my point. If the CA's DNS is secure, the EV system is safe. If
>> it's not, it's not. So the two are linked, and they shouldn't be.
> 
> I think you meant DV, not EV here...

No, I mean EV, because the security of EV depends on the security of DV
if browsers don't throw a warning for mixed EV/DV content.

> However with EV (and other validated certificates) it's highly unlikely
> that the subscriber would even attempt to get a certificate for a domain
> over which he shouldn't have any control.
> 
> In any case SSL certificates are here to protect against DNS
> vulnerabilities and not as you stated.

Once they are correctly issued, they indeed protect against this. My
point is that an attacker can cause them to be incorrectly issued.

> For example Google Analitics is JavaScript code. In that
> code - or any other code included by a third party, it would be fairly
> easy to snoop for credit card and other details...

If you are suggesting that we modify the EV standard in a way which
makes it impossible for companies to outsource web analytics, I will
suggest you are not living in the real world. :-)

Gerv
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to