It is possible to exploit the protocol to obtain certificates for domains you do not own.

Leave a Reply