bokehman wrote:Well:
The common names on the certificate would not match so the browser would raise an error
No, because for $16, Godaddy can't afford to tell the difference between a phisher and an upstanding member of society.
16USD is not enough to do even the most CURSORY checks that the applicant actually owns the domain etc, hasn't forged their details etc.
[*]A certificate is a public document anyway.
But the phisher would have their own private key.
[*]If the server was comprimised swapping SSL certificates would not be the method used to harvest details. A simple include($remote_file); would be much more effective.
True, if the server was compromised, the SSL certificate would be compromised too (and should be revoked by the provider as soon as they find out).
Mark