(no title)
0x0
|
10 months ago
So I guess you couldn't get certificates for any random (MX) domain, only for those where you can obtain an inbox / user account. Still really bad, especially for things like gmail.com, but also larger enterprises. Intense.
tptacek|10 months ago
Issuing a Google certificate is a good way to get your whole CA killed.
AdamJacobMuller|10 months ago
This would affect ANY email provider who offers public email addresses. While I agree gmail.com is probably excluded (and maybe this doesn't bypass CAA -- maybe it does) there's a whole additional surface of anyone who has an email at any big enterprise getting a certificate for their domain.
Even if I work at google.com, therefore have a google.com email, I should absolutely not be able to get a certificate for google.com just by getting an email at that company.
I doubt it's even /that hard/ to buy an email account at a big company like that in the underground world, it seems like they are valuable generally and any company with 200k employees is going to have some leaks. This massively increases the attack surface of a simple leaked email account (which might otherwise have very little or no access).
Crazy crazy oversight that has huge implications and is so easy to carry out that I would not be surprised if this was actually exploited by bad actors.
bawolff|10 months ago
Surely what happened here is a good way to get your CA killed? The linked bug seems pretty bad.
unit149|10 months ago
[deleted]
remram|10 months ago
edit: I was thinking about this: https://news.ycombinator.com/item?id=41818459
cperciva|10 months ago
mukesh610|10 months ago
AdamJacobMuller|10 months ago
I wouldn't assume that the bug doesn't bypass CAA checking.
Very important question to answer.
jsheard|10 months ago
mcpherrinm|10 months ago
thayne|10 months ago
I think they have already addressed the bug.