--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+unsubscribe@chromium.org.
To post to this group, send email to ct-p...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/e5da8c37-1458-4b30-aa29-f0192dd3c429%40chromium.org.
How are ISVs or local organization PKIs that do local-traffic-only-CA SSL impacted? I'm struggling to find an explanation of what would put these organizations in-scope or out-of-scope for this mandate.
Apologies for topic-hijacking, it's the first public-forum question that I could find asking this. :)
Publicly-trusted means any CA that is trusted by default on any supported platform that Chrome runs on. More generally, this includes anything shipped by default by the system's root store, when that system's root store is used.
it is not possible for locally trusted CAs to log to CT logs that only trust publicly-trusted certificates.
Publicly-trusted means any CA that is trusted by default on any supported platform that Chrome runs on. More generally, this includes anything shipped by default by the system's root store, when that system's root store is used.Ok. This is the part that's a bit vague reading the various material, but this information is very helpful.it is not possible for locally trusted CAs to log to CT logs that only trust publicly-trusted certificates.So to reiterate, the following (somewhat common) scenarios will **NOT** be impacted by this change:
- A System Administrator rolls out a PKI internal to an organization that is NOT part of the OS root store
- A Software Developer utilizes a locally (device-trusted) software-made CA cert that is NOT part of the OS root store
I just nudged a machine to Chrome 66, re-generated the cert for today-forward and can confirm this for the second (device-trusted) scenario. Thank you for the quick reply.
Depends. If it chains to a publicly trusted CA, then regardless of manual installation, it's expected.
I just nudged a machine to Chrome 66, re-generated the cert for today-forward and can confirm this for the second (device-trusted) scenario. Thank you for the quick reply.
This is not a correct test. Could you indicate what information led you to believe it was, so we can see how best to correct that misunderstanding?
Put more specifically: CAs are expected from today onward to log their certificates in publicly trusted CT logs, and a future version of Chrome will enforce this. The policy went into effect today - but the code to enforce it will be rolled out through release channels.
Depends. If it chains to a publicly trusted CA, then regardless of manual installation, it's expected.Thanks for clarifying. I was speaking around non-publicly-trusted CAs.I just nudged a machine to Chrome 66, re-generated the cert for today-forward and can confirm this for the second (device-trusted) scenario. Thank you for the quick reply.This is not a correct test. Could you indicate what information led you to believe it was, so we can see how best to correct that misunderstanding?Bleeping computer (Delivered via news-feed by Google Assistant) states..."Starting Today, Google Chrome Will Show Warnings for Non-Logged SSL Certificates".
Put more specifically: CAs are expected from today onward to log their certificates in publicly trusted CT logs, and a future version of Chrome will enforce this. The policy went into effect today - but the code to enforce it will be rolled out through release channels.Ok, so for clarification:
- Unit test is incomplete and incorrect because code enforcement within Chrome 66 has not begun
- Despite incomplete testing, aforementioned scenarios should **still be OK** :)
That said, is there a build (e.g. Canary) that can quickly browse a site (e.g. nontransparent-hostname(dot)org) to baseline this new behavior?
"%localappdata%\Google\Chrome SxS\Application\chrome.exe" --enable-features="EnforceCTForNewCerts<EnforceCTTrial" --force-fieldtrials="EnforceCTTrial/Group1" --force-fieldtrial-params="EnforceCTTrial.Group1:date/1512086400"