* Ben Bucksch:

> Now, 3 years later, some scammers and spammers actually notice me and
> set up fake SSL sites with my certs.

Not just fake sites.  Some of the OEM software spammers use valid SSL
certificates for the checkout procedure, e.g.:

  <https://secure.securesoftmarket.com/>

For those trying to figure who has issued the certificate: Equifax
(the data broker) sold the root to Geotrust, which was then bought by
Verisign.

> I smile.

I fear that most of the historic root certs and many of the newer ones
have problems comparable to Comodo and Verisign.  This is a good
situation for the CAs because it limits what browsers and end users
can do.  It's difficult to select business partners who do not suffer
from those backyard (or frontyard) problems, so why bother at all?

Usually, if the industry is not totally rotten, some players clean up
the field, often using the court system (we see attempts at that in
the antivirus market, for instance).  I doubt that this will happen
with certificates because it's hard to see why issuing a certificate
creates liability, while delegating a domain does not.  And this is a
matter many players will only touch with a ten-foot pole.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to