
Email DCV can die in a fire
With Whois based DCV killed off at the start of this year, I think it's time the CA/Browser forum got serious with removing the other flaky forms of DCV. There's still a couple of email based DCV methods, including the one in this article. The most ridiculous IMO is emails to a 'well known' address which may not be that well known by most ppl and thus vulnerable to abuse.
CAs arent obliged to support these dodgy DCV methods, but they do, because if someone wants to pay, who are they to say no? After all it might delay a customer migrating to an automated DCV method. down that path lies Let's Encrypt and damnation (also known as zero cash).
nevertheless this particular issue appears to be just plain sloppiness on the part of SSL.com.