Eddy:

It's important to realize something rather important... security must
be designed into the system from the ground up, and all pieces of a
secure system must operate together properly.  It's not *just* the CA,
it's everything.

Since we don't have a secure system, we need to find a way to make
things as secure as possible given the lack of cooperation from the
registrars/ICANN/browser vendors/CAs/users.

-Kyle H

On Mon, Feb 23, 2009 at 3:54 PM, Eddy Nigg <eddy_n...@startcom.org> wrote:
> On 02/24/2009 01:23 AM, Gervase Markham:
>>
>> All the registries added to the list had this when they were added. As I
>> said in my previous message, if you know of a registry which no longer
>> meets these criteria, please let me know.
>
> How to prove? Does Mozilla buy domain names (or purchase certificates) from
> time to time in order to govern its policies?
>
>> CAs are irrelevant to spoofing issues. If www.something.com is a
>> homograph for www.someth1ng.com, that's a bad thing irrespective of
>> whether the owners of each of the two domains can get a certificate for
>> them.
>
> Only CAs are relevant if at all. You don't expect that 200 domain names were
> registered by going through anti-spoofing checking and measures, do you?!
>
> Concerning the example above, a certificate for the later would represent a
> problem at least for some CAs, it might be nevertheless issued if there is
> evidence that no basis for concern exists (due to out-of-bound identity
> validation for example).
>
>
> --
> Regards
>
> Signer: Eddy Nigg, StartCom Ltd.
> Jabber: start...@startcom.org
> Blog:   https://blog.startcom.org
> --
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to