All,

The Chrome Root Program Policy
<https://www.chromium.org/Home/chromium-security/root-ca-policy/> states
that CA certificates included in the Chrome Root Store
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/root_store.md>
must
provide value to Chrome end users that exceeds the risk of their continued
inclusion. It also describes many of the factors
<https://www.chromium.org/Home/chromium-security/root-ca-policy/#7-reporting-and-responding-to-incidents>
we
consider significant when CA Owners disclose and respond to incidents. When
things don’t go right, we expect CA Owners to commit to meaningful and
demonstrable change resulting in evidenced continuous improvement.

Over the past 6 months, publicly disclosed incident reports
<https://bugzilla.mozilla.org/buglist.cgi?o2=greaterthaneq&short_desc_type=casesubstring&o1=notequals&v1=Graveyard&classification=Client%20Software&classification=Developer%20Infrastructure&classification=Components&classification=Server%20Software&classification=Other&classification=Graveyard&v2=2023-11-01&f1=classification&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=RESOLVED&bug_status=VERIFIED&bug_status=CLOSED&short_desc=Entrust&f2=creation_ts&component=CA%20Certificate%20Compliance&query_format=advanced&list_id=17023050>
highlighted
a pattern of concerning behaviors by Entrust that fell short of the above
expectations, and has eroded confidence in its competence, reliability, and
integrity as a publicly-trusted CA Owner.

These concerning behaviors include, but are not limited to:

   -

   Numerous recent violations of the CA/Browser Forum TLS Baseline
   Requirements (e.g., [1
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1883843>], [2
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1886467>], and [3
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1889217>]), which in some
   cases were willful (e.g., [4
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1883843#c4>], [5
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1890898#:~:text=This%20incident%20report%20covers%20the%20certificates%20reported%20in%20bug%20https%3A//bugzilla.mozilla.org/show_bug.cgi%3Fid%3D1890896%2C%20CPS%20typographical%20(text%20placement)%20error%2C%20where%20we%20decided%20to%20not%20revoke%20due%20to%20exceptional%20conditions%20listed%20in%20this%20report.>],
   and [6
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1890685#:~:text=44%20UTC.-,We%20decided%20to%20not%20revoke%20the%20affected%20certificates%20due%20to%20exceptional%20conditions%20listed%20in%20this%20report.,-Impact>
   ]).
   -

   Untimely and often incomplete incident reporting (e.g., [7
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1890901>], [8
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1890123>], and [9
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1885754>]).
   -

   A failure to demonstrate an understanding of the root causes of an
   incident and a lack of a substantive commitment and timeline to changes
   that clearly and persuasively address the root cause(s) (e.g., [10
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1898848>], [11
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1897630>], and [12
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1883843>]).
   -

   A failure to adopt industry requirements and standards as they became
   required (e.g., [13
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1889217>], [14
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1885754#c15>], and [15
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1879602>]).
   -

   A failure to design error-proof and/or compliant certificate issuance
   systems and corresponding processes (e.g., [16
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1898848>], [17
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1885754>], and [18
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1879602>]).
   -

   A failure to uphold commitments made in policy and in response to Web
   PKI incidents (e.g., [19
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1667690#:~:text=We%20are%20making%20changes%20to%20our%20incident%20response%20process%20and%20systems%20to%20make%20sure%20we%20provide%20the%20original%20reporter%20with%20a%20preliminary%20report%20within%2024%20hours.>],
   [20
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1731887#:~:text=We%20will%20ensure%20that%20our%20updated%20practices%20will%20cover%20all%20compliance%20requirements%20to%20the%20BRs%2C%20EVGs%2C%20Mozilla%20Policy%20and%20other%20root%20store%20policies.>],
   [21
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1883843#:~:text=We%20are%20committed%20to%20ensuring%20that%20our%20actions,practices%2C%20informed%20by%20constructive%20dialogue%20within%20the%20industry.>],
   [22
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1611241#:~:text=We%20are%20making,the%20case/email.>],
   [23 <https://bugzilla.mozilla.org/show_bug.cgi?id=1648472#c16>], and [24
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1651481#:~:text=future%20revocation%20delays.-,We%20will%20not%20the%20make%20the%20decision%20not%20to%20revoke.,and%20post%2Dissuance%20linting%20to%20discover%20or%20prevent%20the%20problem%20early.,-Flags%3A%20needinfo>
   ]).
   -

   A failure to understand incident reporting expectations with negligible,
   if any, improvement over time, especially while evaluating the complete set
   of incident report disclosures available in Bugzilla (e.g., [25
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1890685#c49:~:text=I%20am%20not%20seen%20a%20single%20concrete%2C%20actionable%20plan%20to%20do%20what%20you%20claim.%20Also%2C%20the%20questions%20posed%20has%20not%20been%20answered%20at%20all.%20Entrust%20claimed%20things%20would%20change%204%20years%20ago.%20What%20has%20changed%3F%20Furthermore%2C%20disavowing%20responsibility%20and%20blaming%20your%20subscribers%20is%20becoming%20a%20trend.>],
   [26
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1898848#c11:~:text=This%20is%20one,and%20continually%20improve.>],
   [27
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1886532#:~:text=Please%20provide%20a,they%27ve%20been%20told.>],
   and [28
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1883843#:~:text=FOUR%20EARTH%20YEARS%20AGO%2C%20Entrust%20was%20educated%20on%20the%20fact%20that%20%E2%80%9Cthis%20misissued%20certificate%20doesn%E2%80%99t%20seem%20to%20have%20a%20security%20impact%E2%80%9D%20was%20not%20an%20acceptable%20reason%20to%20declare%20a%20situation%20as%20exceptional%20and%20avoid%20revocation.>
   ]).
   -

   A failure to accept accountability or responsibility for its failures,
   often appearing to instead blame external forces for its compliance
   failures (e.g., [29
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1883843#:~:text=We%20recognize%20our%20responsibility%20to%20the%20internet%20users%20and%20our%20actions%20were%20focused%20on%20preventing%20disruption%2C%20as%20these%20certificates%20did%20not%20pose%20any%20security%20risk%20to%20the%20internet%20users%20and%20we%20initially%20believed%20that%20the%20incident%20was%20the%20result%20of%20an%20error%20in%20the%20EV%20guidelines.>],
   [30
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1888714#:~:text=We%20believe%20that%20there%20may%20have%20been%20an%20error%20in%20ballot%20151%20and%20TLS%20BR%201.5.7%20(see%20https%3A//cabforum.org/uploads/EV%2DV1_5_7%2Dredlined.pdf).%20In%20this%20update%20the%20following%20statements%20were%20made%3A>],
   [31
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1889217#:~:text=The%20CRL%20generation%20software%20was%20created,continued%20to%20use%20the%20faulty%20implementation.>],
   and [32
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1890898#c67:~:text=including%20the%20fact-,that%20it%20is%20Chrome%E2%80%99s%20position%20that%20the%20certificates%20are%20mis%2Dissued%2C%20and%20that%20Entrust%E2%80%99s%20own%20analysis%20came%20to%20a%20different%20conclusion.,-Wayne>
   ]).
   -

   A failure to convey assurance of appropriate resourcing and an
   understanding of ecosystem requirements and expectations (e.g., [33
   
<https://bugzilla.mozilla.org/show_bug.cgi?id=1898848#:~:text=already%20being%20addressed.-,4.%20Why%20were%20the%20existing%20processes%20and%20resources%20not%20sufficient%20to%20trigger%20investigation%2C%20escalation%2C%20and%20confirmation%20of%20an%20incident%2C%20and%20revocation%20of%20the%20affected%20certificates%2C%20within%20an%20acceptable%20timeframe%3F,-At%20relevant%20points>],
   [34 <https://bugzilla.mozilla.org/show_bug.cgi?id=1890901#c1>], [35
   <https://bugzilla.mozilla.org/show_bug.cgi?id=1885754#c15>], and [36
   
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/LhTIUMFGHNw/m/aGxHqDU4AgAJ>
   ]).


These concerning behaviors are further amplified because of:

   -

   Their collective impact when considered in aggregate.
   -

   A 6+ year history
   
<https://bugzilla.mozilla.org/buglist.cgi?o2=greaterthaneq&short_desc_type=casesubstring&o1=notequals&v1=Graveyard&classification=Client%20Software&classification=Developer%20Infrastructure&classification=Components&classification=Server%20Software&classification=Other&classification=Graveyard&v2=2015-11-01&f1=classification&bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=RESOLVED&bug_status=VERIFIED&bug_status=CLOSED&short_desc=Entrust&f2=creation_ts&component=CA%20Certificate%20Compliance&query_format=advanced&list_id=17064895>
   of similar responses to past incidents demonstrates these behaviors are
   both systemic and persistent.


We have been closely following the discussions in the MDSP
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/LhTIUMFGHNw/m/uKzergzqAAAJ>
community
regarding Entrust’s compliance failures. Despite being given a clear
opportunity to thoroughly and satisfactorily address these issues through
an initial report, Entrust’s response failed to meet our and the
community’s expectations. When provided with yet another chance to rise to
the expected level of a public CA Owner, the subsequent report, although
superficially improved, still does not offer substantive, convincing
evidence of meaningful change.

Upon careful review of both reports and considering ongoing incidents,
which in some cases demonstrate contradictory behavior and opinions from
those described in the updated report, we’re unable to find significant
deviation from Entrust’s past failed commitments. It is our opinion that
the recent commitments do not offer sufficient reason to believe they will
result in different outcomes, and the promises made are reminiscent of
those from the past, which did not lead to the required improvements.

In response to the above concerns and to preserve the integrity of the Web
PKI ecosystem, Chrome will take the following actions.

Upcoming change in Chrome 127 and higher:

   -

   TLS server authentication certificates validating to the following
   Entrust roots whose earliest Signed Certificate Timestamp (SCT) is dated
   after October 31, 2024 (GMT), will no longer be trusted by default.
   -

      CN=Entrust Root Certification Authority - EC1,OU=See
      www.entrust.net/legal-terms+OU=(c) 2012 Entrust, Inc. - for
authorized use
      only,O=Entrust, Inc.,C=US
      
<https://crt.sh/?q=02ED0EB28C14DA45165C566791700D6451D7FB56F0B2AB1D3B8EB070E56EDFF5>

      -

      CN=Entrust Root Certification Authority - G2,OU=See
      www.entrust.net/legal-terms+OU=(c) 2009 Entrust, Inc. - for
authorized use
      only,O=Entrust, Inc.,C=US
      
<https://crt.sh/?q=43DF5774B03E7FEF5FE40D931A7BEDF1BB2E6B42738C4E6D3841103D3AA7F339>
      -

      CN=Entrust.net Certification Authority
      (2048),OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)+OU=(c)
      1999 Entrust.net Limited,O=Entrust.net
      
<https://crt.sh/?q=6DC47172E01CBCB0BF62580D895FE2B8AC9AD4F873801E0C10B9C837D21EB177>
      -

      CN=Entrust Root Certification Authority,OU=www.entrust.net/CPS is
      incorporated by reference+OU=(c) 2006 Entrust, Inc.,O=Entrust, Inc.,C=US
      
<https://crt.sh/?q=73C176434F1BC6D5ADF45B0E76E727287C8DE57616C1E6E6141A2B2CBC7D8E4C>
      -

      CN=Entrust Root Certification Authority - G4,OU=See
      www.entrust.net/legal-terms+OU=(c) 2015 Entrust, Inc. - for
authorized use
      only,O=Entrust, Inc.,C=US
      
<https://crt.sh/?q=DB3517D1F6732A2D5AB97C533EC70779EE3270A62FB4AC4238372460E6F01E88>
      -

      CN=AffirmTrust Commercial,O=AffirmTrust,C=US
      
<https://crt.sh/?q=0376AB1D54C5F9803CE4B2E201A0EE7EEF7B57B636E8A93C9B8D4860C96F5FA7>
      -

      CN=AffirmTrust Networking,O=AffirmTrust,C=US
      
<https://crt.sh/?q=0A81EC5A929777F145904AF38D5D509F66B5E2C58FCDB531058B0E17F3F0B41B>
      -

      CN=AffirmTrust Premium,O=AffirmTrust,C=US
      
<https://crt.sh/?q=70A73F7F376B60074248904534B11482D5BF0E698ECC498DF52577EBF2E93B9A>
      -

      CN=AffirmTrust Premium ECC,O=AffirmTrust,C=US
      
<https://crt.sh/?q=BD71FDF6DA97E4CF62D1647ADD2581B07D79ADF8397EB4ECBA9C5E8488821423>
      -

   TLS server authentication certificates validating to the above set of
   roots whose earliest SCT is on or before October 31, 2024 (GMT), will be
   unaffected by this change.


This approach attempts to minimize disruption to existing subscribers using
a recently announced Chrome feature
<https://source.chromium.org/chromium/chromium/src/+/main:net/cert/root_store.proto;drc=a783c3bab474ff68e675e2753f91c92ca817e072;l=15?q=f:root_store.proto&ss=chromium>
to
remove default trust based on the SCTs in certificates.  A recently
published Google Security Blog post
<https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html>
includes
additional information for affected subscribers, to include instructions
for testing the impact of the described change before it takes effect.

Should a Chrome user or enterprise explicitly trust
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/faq.md#Does-the-Chrome-Certificate-Verifier-consider-local-trust-decisions>
any
of the above certificates on a platform and version of Chrome relying
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/faq.md#when-did-these-features-land>
on
the Chrome Root Store
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/root_store.md>
(e.g.,
explicit trust is conveyed through a Windows Group Policy Object), the
SCT-based constraints described above will be overridden and certificates
will function as they do today.

Until Entrust’s CA certificates are no longer included in the latest
available version of the Chrome Root Store, we expect Entrust’s continued
adherence to the Chrome Root Program Policy. Failure to do so may result in
an accelerated removal timeline and/or additional restrictions.

Our decision is based on a consistent pattern of unmet commitments, and the
absence of tangible, measurable progress in response to publicly disclosed
incident reports over the past six years. While our decision is firm and
one we consider reasonable given the potential for harm a public CA poses
to the Internet ecosystem, we encourage Entrust to remain committed to the
principles described in their latest report and to demonstrate genuine
change. By doing so, they may have the opportunity to regain the trust
required to serve as a public CA in the future.

As we do with all CA Owners included in the Chrome Root Store, we will
continue to use tools available to us, including Chrome’s internal PKI
Monitoring solution, to measure and evaluate ongoing compliance objectives
and protect Chrome’s users.

Thank you.

-Ryan, on behalf of the Chrome Root Program

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/CADEW5O-E%2Bf4Rv3HBDq4AyX7B2JxDwcFuiBKg3L9wkvfBedbkAA%40mail.gmail.com.

Reply via email to