Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Posted Aug 30, 2011 22:43 UTC (Tue) by dlang (guest, #313)In reply to: Fraudulent *.google.com certificate issued by martinfick
Parent article: Fraudulent *.google.com certificate issued
Posted Aug 30, 2011 22:51 UTC (Tue)
by martinfick (subscriber, #4455)
[Link] (5 responses)
Posted Aug 31, 2011 15:43 UTC (Wed)
by raven667 (subscriber, #5198)
[Link] (4 responses)
Posted Aug 31, 2011 15:56 UTC (Wed)
by martinfick (subscriber, #4455)
[Link] (3 responses)
Posted Aug 31, 2011 16:37 UTC (Wed)
by raven667 (subscriber, #5198)
[Link]
Building up the paper trail that a CA needs to be accepted by the browsers does require effort and time but you are right in that I have not worked close enough to the CA/browser relationship to know exactly what is required to register with MS, Mozilla, Apple, Opera, Oracle, Google, RIM, and other vendors.
Posted Sep 1, 2011 7:56 UTC (Thu)
by Comet (subscriber, #11646)
[Link] (1 responses)
Things like Linkage Analysis, where they figure out which companies own which other companies, and trace down who actually owns a company.
It's human legwork to maintain their databases. Thus they get to charge money for queries against them.
So, I certainly hope that the major CAs are doing at least a paid check with one of the merchant houses before issueing EV certs, and anyone bundling together a group of CAs for others to trust should either be saying "don't trust us, this is just what we find convenient" (amateur, but sometimes appropriate) or should be doing the same due diligence.
Posted Sep 1, 2011 18:20 UTC (Thu)
by raven667 (subscriber, #5198)
[Link]
In this case though attackers are believed to have compromised the infrastructure and had enough access that they could issue whatever they liked without going through the audit and security controls. The technical measures which could prevent this are difficult, cumbersome, expensive and not foolproof. At some point you have to be able to accept a CSR from a customer and expose it to the HSA and receive a result. If you can get anywhere in that path you can send your own CSRs and have whatever you want signed.
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued
Fraudulent *.google.com certificate issued