2016 Postmortem
In reply to the discussion: So let me get this straight... [View all]Recursion
(56,582 posts)(Or, you're probably not, but your comments could lead others to.)
The domain name was registered though a small ISP in NY. It was not registered by the government.
OK, still doesn't matter. The certificate was issued by the government CA. Government computers have that CA in their root store (and not much else). If it had been issued by Verisign or Thawte or whatever the government email servers wouldn't have talked to it.
And there's several million different entities with certificates. The fact that it's only 172 is actually pretty good.
But any one of them can sign a certificate for a domain ending in .gov. We should probably do something about that. I know the USG computers have a very restricted set of accepted certificate authorities, for instance, but that won't work for general public use. Right now, their alleged probity is allegedly policed primarily just by Microsoft, Google, the Mozilla Foundation, and the Debian Foundation.
Google has an interesting idea to use a certificate-pinning peer-review system, kind of like what OpenSSH uses. That could be useful, though not foolproof, particularly for new domains.