Comment by danielweber
11 years ago
I'll run a free CA right now. Who wants a cert for microsoft.com?
NB: This is a bit unfair, because the existing for-money CAs haven't always stopped someone from registering microsoft.com.
11 years ago
I'll run a free CA right now. Who wants a cert for microsoft.com?
NB: This is a bit unfair, because the existing for-money CAs haven't always stopped someone from registering microsoft.com.
You raise a good point though, SSL/TLS Certs are trying to deal with two separate problems:
1. Over the wire encryption (which this handles)
2. As a bad, but the best we've got site identification system for stopping phishing mechanism.
Currently, for even the cheapest certs (domain+email validated) - the CAs will reject SSL cert requests for anything that might be a phishing target. Detecting "wellsfargo.com" is pretty easy, where it gets tricky is things like "wellsforgo.com", "wellsfàrgo.com" etc. Which if I'm looking at this right will just sail through with LetsEncrypt.
I suspect we're going to actually end up with two tiers of SSL certs as the browser makers have started to really de-emphasize domain validated certs [1] like this vs the Extended Validation (really expensive) certs, to the point where in most cases now having a domain cert does not know green (and maybe doesn't even show a lock) at all.
As a side note, Google had announced that they were going to start using SSL as a ranking signal [2] (sites with SSL would get a slight bump in rankings), from this perspective the "high" cost of a cert was actually a feature as it made life much more expensive on blackhat SEOs who routinely are setting up hundreds of sites.
1 - Screenshots: https://www.expeditedssl.com/pages/visual-security-browser-s...
2 - http://googlewebmastercentral.blogspot.com/2014/08/https-as-...
If you can make microsoft.com serve up the correct challenge response, you'll be able to get a cert for them issued by the this project. This isn't a pure rubber-stamping service.
There are also going to be controls to limit automated issuance for domains with existing certs, among other criteria.