mailing list archives
Questions about MD5+CA
From: Dave Aitel <dave () immunityinc com>
Date: Tue, 30 Dec 2008 12:43:30 -0500
-----BEGIN PGP SIGNED MESSAGE-----
So if someone was able to get a root CA for $20000 - shouldn't we
remove the RapidSSL root CA from our browsers with the next browser
update? I don't see why people think this would be hard to replicate
and hasn't been done previously to RapidSSL. Is it because no one
other than that one team can do math or buy PS3s?
Microsoft's advisory on this is essentially defaulting to the "No one
else has ever done this" position. This is weird. Trusted Roots that
could have been used to sign these things need to get re-issued,
right? What am I missing here?
"You fail and are no longer trusted" seems like a viable option here
that people are avoiding for some reason.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
Dailydave mailing list
Dailydave () lists immunitysec com
- Questions about MD5+CA Dave Aitel (Dec 30)