Greetings,

As we get to the end of 2025, it’s time to reflect on the past year and to
think about the challenges and conversations we’ll have in 2026. Community
input has shaped virtually every meaningful improvement for Mozilla and the
Web PKI, and I expect that to continue. I want to share some observations
and thoughts in areas where I expect our collective attention may be
needed, so we can continue to make good progress.

Earlier in the year, we published Mozilla Root Store Policy v. 3.0, which
introduced clearer expectations for Mass Revocation Planning and several
other improvements that we’ll continue refining as we see how they work in
practice. We also hosted our first roundtable discussion, which uncovered a
number of shared challenges—CPS clarity, incident reporting expectations,
revocation handling, and automation. It also produced several action items
for us to work on. Some are underway; others still need attention,
including updates to the Forbidden and Problematic Practices and Recommended
Practices wiki pages.

We also made some progress on incident reporting. During the roundtable
discussions, CAs expressed uncertainty about how to respond to different
types of questions and comments coming from different perspectives—probing,
rhetorical, clarifying, anonymous, etc. Another related topic that came up
during the roundtable was when should a Bugzilla discussion be moved to
m.d.s.p. or the CCADB Public list. Several people suggested documenting
best practices for these discussions and offering clearer criteria. All of
us would benefit from clearer guidance, and this is an area we plan to
address in 2026 with input from this community.

In addition, we updated several CA wiki pages (see
https://wiki.mozilla.org/CA), including Lessons Learned, the CA Inclusion
Process, and the Value Statement, and we continued to improve our
documentation and transparency practices throughout the year. We can
continue this momentum next year with community participation–suggestions,
examples, and improved wording.

The next year will present significant challenges. Several CAs will need to
transition to newer root hierarchies, and those operating dual-purpose
roots will begin the move toward dedicated, single-purpose hierarchies.
These transitions inevitably raise operational questions, and I expect that
we’ll need continued discussion about timelines, expectations, and edge
cases.

CAs will also be submitting audit reports that include tested
mass-revocation procedures. This is still an area where we are learning, so
I’m especially interested in community feedback about what’s working, what
isn't, and what gaps remain.

We'll also see ongoing changes driven by updates to the Baseline
Requirements. Here are just a few:

   -

   Multi-Perspective Issuance Corroboration (MPIC) expanding to 5 remote
   perspectives by December 2026, with regional diversity requirements;
   -

   DNSSEC required for domain validation and CAA checking;
   -

   Certificate validity and domain and IP validation reuse reduced to 200
   days;
   -

   Documentation reuse limited to 398 days; and
   -

   Short-lived certificates reduced to 7 days.

These changes will require thoughtful implementation, and moving into 2026,
we’ll rely on continued collaboration and good communication to ensure that
the new requirements are clearly understood, well-supported, and
consistently met.

We should also expect continued discussion around the designated use of
revocation reason codes in section 4.9.1.1 of the TLS BRs. Mozilla is
interested in improving the clarity and utility of revocation reasons,
particularly for scenarios where browser behavior may depend on more
accurate and detailed explanations. This is another area where feedback
will be essential.

On the root inclusion side, we will continue refining the CA inclusion
process, reviewing CPSes and Value Statements, and working with applicants
and existing CAs to ensure transparency and completeness. And we will keep
encouraging the adoption of ACME, ARI, and similar automation technologies,
which reduce the tension around certificate replacement and revocation.

Improving the reliability and resilience of the Web PKI is an important
goal for 2026. This theme will be reflected in efforts to:

   -

   improve transparency and communication around incidents,
   -

   increase automation and agility,
   -

   coordinate root and hierarchy replacements,
   -

   strengthen revocation processes, and
   -

   ensure that root inclusion and management remain clear and predictable.

Finally, I want to thank everyone who contributed this year—whether here,
through incident discussions on Bugzilla, during policy reviews, CCADB
updates, or participation during roundtable discussions. This community has
always been central to how Mozilla approaches PKI stewardship, and I
appreciate the time and expertise you bring to these conversations.

I look forward to working with all of you in 2026 and to our continued
discussions.

Best wishes,

Ben

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaY%2BZPRQRou3LUhHkn2kb%2BmToJkHof%2B3vTZau8nGMcP8kg%40mail.gmail.com.

Reply via email to