I can think of cases where an attacker can do one or not the other (in particular where they're intercepting traffic near the web server end, not the client). In those cases there is a benefit.
Because the CA is not hosted by the server itself, the routing path is very different and only converges near the end user.
I know it's less likely but to say that there is no security at all is not true in my opinion.
Because the CA is not hosted by the server itself, the routing path is very different and only converges near the end user.
I know it's less likely but to say that there is no security at all is not true in my opinion.