[This message is being sent on behalf of the Chrome Root Program to 
[email protected].]

All, 

The Chrome Root Program Policy 
<https://googlechrome.github.io/chromerootprogram/> states that 
Certification Authority (CA) certificates included in the Chrome Root Store 
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/root_store.md>
 
must provide value to Chrome end users that exceeds the risk of their 
continued inclusion. It also describes many of the factors 
<https://googlechrome.github.io/chromerootprogram/#51-incident-reports> we 
consider significant when CA Owners disclose and respond to public 
incidents. When things don’t go right, we expect CA Owners to commit to 
meaningful and demonstrable change resulting in evidenced continuous 
improvement.

Chrome's confidence in the reliability of certain CA Owners included in the 
Chrome Root Store has diminished due to patterns of concerning behavior 
observed over the past year. These patterns represent a loss of integrity 
and fall short of expectations, eroding trust in these CA Owners as 
publicly-trusted certificate issuers trusted by default in Chrome. To 
safeguard Chrome’s users, and preserve the integrity of the Chrome Root 
Store 
<https://security.googleblog.com/2023/05/how-chrome-root-program-keeps-users-safe.html#:~:text=Chrome%20uses%20digital,the%20%E2%80%9CWeb%20PKI.%E2%80%9D>,
 
we are taking the following action.

Upcoming change in Chrome 139 and higher:


   - 
   
   Transport Layer Security (TLS) server authentication certificates 
   validating to the following root CA certificates whose earliest Signed 
   Certificate Timestamp (SCT) is dated after July 31, 2025 11:59:59 PM UTC, 
   will no longer be trusted by default.
   - 
      
      OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co., Ltd.,C=TW 
      
<https://crt.sh/?q=c0a6f4dc63a24bfdcf54ef2a6a082a0a72de35803e2ff5ff527ae5d87206dfd5>
      - 
      
      CN=HiPKI Root CA - G1,O=Chunghwa Telecom Co., Ltd.,C=TW 
      
<https://crt.sh/?q=f015ce3cc239bfef064be9f1d2c417e1a0264a0a94be1f0c8d121864eb6949cc>
      - 
      
      CN=NetLock Arany (Class Gold) Főtanúsítvány,OU=Tanúsítványkiadók 
      (Certification Services),O=NetLock Kft.,L=Budapest,C=HU 
      
<https://crt.sh/?q=6c61dac3a2def031506be036d2a6fe401994fbd13df9c8d466599274c446ec98>
      


   - 
   
   TLS server authentication certificates validating to the above set of 
   roots whose earliest SCT is on or before July 31, 2025 11:59:59 PM UTC, 
   will be unaffected by this change. 
   

This approach attempts to minimize disruption to existing subscribers using 
a previously announced Chrome feature 
<https://source.chromium.org/chromium/chromium/src/+/main:net/cert/root_store.proto;drc=a783c3bab474ff68e675e2753f91c92ca817e072;l=15?q=f:root_store.proto&ss=chromium>
 
to remove default trust based on the SCTs in TLS certificates. A recently 
published Google Security Blog *post* 
<https://security.googleblog.com/2025/05/sustaining-digital-certificate-security-chrome-root-store-changes.html>
 
includes additional information for affected subscribers that allow for 
testing the impact of the described change before it takes effect.

Should a Chrome user or enterprise explicitly trust 
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/faq.md#How-does-the-Chrome-Certificate-Verifier-integrate-with-platform-trust-stores-for-local-trust-decisions>
 
any of the above certificates on a platform and version of Chrome relying 
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/faq.md#when-did-these-features-land>
 
on the Chrome Root Store 
<https://chromium.googlesource.com/chromium/src/+/main/net/data/ssl/chrome_root_store/root_store.md>
 
(e.g., explicit trust is conveyed through a Windows Group Policy Object), 
the SCT-based constraints described above will be overridden and 
certificates will function as they do today.  

Until these CA certificates are no longer included in the latest available 
version of the Chrome Root Store, we expect the CA Owners’s continued 
adherence to the Chrome Root Program Policy. Failure to do so may result in 
an accelerated removal timeline and/or additional restrictions (e.g., name 
constraints).

As we do with all CA Owners included in the Chrome Root Store, we will 
continue to use tools available to us, including Chrome’s internal PKI 
Monitoring solution, to measure and evaluate ongoing compliance objectives 
and protect Chrome’s users.

-The Chrome Root Program

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/5e026e82-b121-4512-8a75-d2d44df2582dn%40ccadb.org.

Reply via email to