Looking for information related to enforcement of CT mandate for Chrome effective next April (?). Has there been any review or discussion of potential impact to classified systems in the Federal Government or military (DoD) that use Chrome? These of course are clearly not "public facing" systems and networks.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+unsubscribe@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/a662b6d1-3e57-49e7-b852-5cf82e01d7c9%40chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/CACvaWvZ6_amfrm6g89hmiyAX737CTbez3eDp2NkgEGZXOHp8dw%40mail.gmail.com.
Hi,The Chrome requirement only applies to publicly trusted CAs (that is, those trusted by a default installation). As you note, such systems and networks do not use publicly trusted CAs, and are unaffected.If those systems do use publicly trusted CAs to issue "internal" certificates, then it goes without saying that having publicly trusted CAs with (effectively) keys to the Internet issuing certificates that cannot be detected or audited by the broader community for compliance (and to ensure no misissuance) is, of course, a non-starter, given the issues that CT has detected and the broader issues in the CA ecosystem.Does that help address your concerns?
On Tue, Oct 17, 2017 at 2:12 PM, A. Kunz <ak...@mitre.org> wrote:
Looking for information related to enforcement of CT mandate for Chrome effective next April (?). Has there been any review or discussion of potential impact to classified systems in the Federal Government or military (DoD) that use Chrome? These of course are clearly not "public facing" systems and networks.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
Using the example Chrome use within the DoD (non-public systems), what would the impact be (if any) when Chrome looks for one of the default CAs that it trusts and cannot reach it? Will Chrome still want to go to a CT log to see if the CAs are still trustworthy even if the browser never attempts to access a web server/appliance/application that is in the browser’s trust store? Will there be a way to configure Chrome for use within the DoD so that it does not go looking for a CT Log server?
The concern is about wanting to avoid a constant barrage of browser (Chrome or other browsers that have embraced CT) popups when used in DoD closed and classified environments.
Andrea
Andrea A. Kunz
AFLCMC/HNCIA (MITRE)
AF PKI SPO
DSN 945-9168
Comm (210) 925-9168
NIPR - andrea....@us.af.mil
SIPR - andrea...@mail.smil.mil
Using the example Chrome use within the DoD (non-public systems), what would the impact be (if any) when Chrome looks for one of the default CAs that it trusts and cannot reach it? Will Chrome still want to go to a CT log to see if the CAs are still trustworthy even if the browser never attempts to access a web server/appliance/application that is in the browser’s trust store? Will there be a way to configure Chrome for use within the DoD so that it does not go looking for a CT Log server?
The concern is about wanting to avoid a constant barrage of browser (Chrome or other browsers that have embraced CT) popups when used in DoD closed and classified environments.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+unsubscribe@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/BY1PR09MB091761201161960031D0BAC8A2800%40BY1PR09MB0917.namprd09.prod.outlook.com.
Hi Andrea,On Wed, May 2, 2018 at 11:45 AM, Kunz, Andrea A. <AK...@mitre.org> wrote:
Using the example Chrome use within the DoD (non-public systems), what would the impact be (if any) when Chrome looks for one of the default CAs that it trusts and cannot reach it? Will Chrome still want to go to a CT log to see if the CAs are still trustworthy even if the browser never attempts to access a web server/appliance/application that is in the browser’s trust store? Will there be a way to configure Chrome for use within the DoD so that it does not go looking for a CT Log server?
(I don't work on Chrome, so I'm sure I'll be corrected on something or another :-))Chrome never makes a connection to a CT log, it relies on SCTs being included in either the TLS handshake, a stapled OCSP response, or the certificate itself.If FPKI (including DoD) is not going to be embedding SCTs in certificates, going forward there are two situations:- People trusting these certificates via root certificates included with their OS (e.g. the Federal Common Policy CA, included in macOS) -- these people will see an interstitial (for certs issued after April 30), _unless_ the CertificateTransparencyEnforcementDisabledForLegacyCas enterprise option is set to exclude this CA from enforcement.- People trusting these certificates via root certificates added by their enterprise to the CA. Enterprise CAs do not enforce CT compliance, so these will not show interstitial.
The concern is about wanting to avoid a constant barrage of browser (Chrome or other browsers that have embraced CT) popups when used in DoD closed and classified environments.
Within DoD you should be able to address this with the enterprise policies for controlling this. Note that any DoD site intended for public consumption should obtain a publicly trusted certificate with embedded SCTs so the public can access them without needing to ignore an interstial (e.g. iad.gov).