On Tuesday, 25 October 2016 15:45:26 UTC+1, Han Yuwei  wrote:
> Is there any timetable for enforcing CAs to support embedded CT or OCSP CT?

Well, the effect of Google's policy is that if you're a subscriber looking to 
obtain certificates a year from now you have three options

1. Don't care about Chrome (though of course this policy may spread to other 
browsers). That option might be attractive if your certificates are from the 
Web PKI but aren't usually examined by browsers. For example in a mail server, 
or in some financial applications. Otherwise it looks like a bad choice.

2. Arrange to implement the TLS SCT extension from your servers and obtain SCTs 
for yourself to pass on to browsers. This does not require any new effort from 
the CA. This would meet Chrome's requirement entirely and is very flexible, but 
can mean significant disruption or even the need for new software development. 
Most customers again will see this as an undesirable choice.

3. Choose a CA that can deliver SCTs with your certificates or maybe via OCSP 
and in the latter case ensure your server software is compatible with that.

I expect option (3) to be overwhelmingly popular, so that Google need do little 
or nothing in the way of "enforcing" this support. Indeed all the big public 
CAs either already have, or are known to be developing this capability.


Obviously Google needs to communicate this clearly to subscribers, and to a 
lesser extent to Chrome users. I think a simple announcement ought to be enough 
at this stage for CAs themselves, if you're operating a public CA in 2016 and 
don't know what Certificate Transparency is you're in the wrong business. But 
for the other two groups effective communication is important over the next 
12-24 months. In the ideal world the CAs would take on some of the burden of 
informing their subscribers, but I think the SHA-1 experience shows that's not 
always a very reliable path.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to