Gervase Markham:
> Eddy Nigg wrote:
>> I wouldn't state it this way, otherwise we urgently need to modify the
>> Mozilla CA policy! An attacker shouldn't be successful in such an
>> attempt and CAs should have controls in place to detect such attempts.
>
> If that's true, then what controls to Startcom (to take an example)
> already have in place to detect this sort of thing?
> http://blog.wired.com/27bstroke6/2008/08/revealed-the-in.html
>
> How would you know if I was using such a flaw to intercept the email
> traffic between Startcom and a site, in order to get a cert for that site?
>

Hehe...you don't really expect me to disclose now publicly each and 
every control in place, but I can share some with you...

For example we have personnel monitoring all CA activities around the 
clock. Amongst other things, we make sure to a reasonable extend that 
the subscribers are who they claim to be - even in the Class 1 (free) 
settings. Every site (to which the certificate is issued) is inspected 
at some point by one of our robots (the subscriber even receives a nice 
message congratulating upon successful installation ;-) ). WHOIS records 
are inspected and matched against the subscriber details both on 
software level and manually. Sample reviews are performed manually by 
our staff. Certificates are flagged for manual review by us according to 
certain criterion, including blacklists of known phishing sites, well 
known brands and domain names, financial institutions, other suspicious 
features etc, etc...

All this on top of other controls, some of them of logistical nature and 
software based etc...I'm not claiming it's not possible, but I feel 
comfortable with what we do...specially since we don't rely only on 
electronics alone. But then there is the design of the infrastructure, 
which itself can make a difference already. I think that's enough for 
now... :-)

-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to