cacert-sysadm AT lists.cacert.org
Subject: CAcert System Admins discussion list
List archive
- From: "Sam Johnston" <samj AT samj.net>
- To: "Philipp Guehring" <philipp AT cacert.org>
- Cc: CAcert System Administrators <cacert-sysadm AT lists.cacert.org>
- Subject: Re: [Cacert-sysadm] CAcert email address snafu
- Date: Mon, 8 Sep 2008 20:50:23 +0200
- List-archive: <http://lists.cacert.org/pipermail/cacert-sysadm>
- List-id: CAcert System Admins discussion list <cacert-sysadm.lists.cacert.org>
On Mon, Sep 8, 2008 at 8:36 PM, Philipp Guehring <philipp AT cacert.org> wrote:
Well, if CAcert is accepted by one or more of the vendors then its binding power will increase significantly - it could even approach or exceed that of 'legacy' signatures. If someone manages to sell your company from under you then it's an epic fail, wouldn't you agree?
Likeliness, I'm not sure. If your email is accessible to an attacker you're stuffed anyway.
Calling the API would be a couple of lines of code, and we could have a few such checks that would 'flag' suspicious applications. We could map IPs to locations and so on too, which is reasonably difficult to circumvent.
Sam
Hi,
Ah, yes. That would be far too much.
> No, the delay needs to be hours, or days - and that would frustrate
> *most* of them.
> Scenario: CEO steps out, attacker creates account, sends probe,Likeliness?
> responds, deletes probe.
Potential impact?
Well, if CAcert is accepted by one or more of the vendors then its binding power will increase significantly - it could even approach or exceed that of 'legacy' signatures. If someone manages to sell your company from under you then it's an epic fail, wouldn't you agree?
Likeliness, I'm not sure. If your email is accessible to an attacker you're stuffed anyway.
> I'm talking about email verifiacation here, but this could just asYes.
> well be used for domains and the victim would never be the wiser. I
> think the best method here is to preiodically check (via a service
> that constantly runs through a list resolving tests and flagging those
> that fail) that the 'test' page, meta tag, cname entry, etc. still exists.
I think the largest barrier we have at the moment is usability.
> Ok, glad we agree. If anything the barrier to entry needs to be
> *lowered* in terms of ease of access to CAcert services (while
> security needs to be raised).
> That's not a bad idea - by checking things like google'sYes. But it's a good deal of work to do on the global scale.
> phishing/malware APIs, trademark gazettes, company searches, etc.
> presumably.
Calling the API would be a couple of lines of code, and we could have a few such checks that would 'flag' suspicious applications. We could map IPs to locations and so on too, which is reasonably difficult to circumvent.
Sam
- Re: [Cacert-sysadm] CAcert email address snafu, Philipp Guehring, 09/07/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Sam Johnston, 09/07/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Philipp Guehring, 09/07/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Sam Johnston, 09/08/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Philipp Guehring, 09/08/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Sam Johnston, 09/08/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Philipp Guehring, 09/08/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Sam Johnston, 09/08/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Philipp Guehring, 09/07/2008
- Re: [Cacert-sysadm] CAcert email address snafu, Sam Johnston, 09/07/2008
Archive powered by MHonArc 2.6.16.