DigiCert turned down their DigiCert Log Server (also known as “CT1”) on January 4, 2022, and as such, Chrome will be transitioning this log to Retired 2 weeks from this announcement. This log’s turn down was announced in December on the certificate-...@googlegroups.com group, which is usually reserved for technical discussions about CT implementation; however, we are now actively monitoring that group for log announcements as well. Going forward, we hope to streamline future log Retirements by clarifying our communications expectations with an update to https://goo.gl/chrome/ct-log-policy/.
Effective 2022-01-24, the following log(s) will transition to Retired, with the last ‘Qualified’ SCT having a timestamp no later than 1642982400, or 2022-01-24T00:00:00Z in ISO 8601 format:
After 2022-01-24, SCTs from DigiCert Log Server will no longer count towards the CT Compliance requirements stating that at least one SCT must come from a CT log that was Qualified, Usable, or ReadOnly at time of check. As such, after this point, it is no longer appropriate to serve SCTs from this log in the TLS handshake, in OCSP responses, or embedded in certificates issued on-or-after 2022-01-24T00:00:00Z.
Embedded SCTs dated prior to 2022-01-24T00:00:00Z will still satisfy CT Compliance requirements that permit SCTs to come from CT logs that are Qualified, Usable, ReadOnly, or Retired at time of check; however, at least one other SCT must come from a non-Retired CT log in order for the certificate to successfully validate in Chrome.
What does this mean for site operators?
If you are delivering SCTs embedded in the certificate, this should require no action on your part. All previously-issued certificates containing SCTs from this log that complied with the Chrome CT Policy will continue to do so.
If you are currently serving SCTs via OCSP, then your CA must take appropriate action to update their OCSP pipeline to include at least one SCT from a non-Google operated log that is Qualified, Usable, or ReadOnly. Once done, you must refresh the OCSP response stapled to the connection. Alternatively, you may choose to provide a policy-satisfying set of SCTs via another mechanism outlined in the Chrome CT Policy.
If you are currently delivering SCTs via a TLS extension, SCTs issued by this log will no longer contribute towards CT Compliance. As such, you must begin to serve SCTs from a separate non-Retired, non-Google log by 2022-01-24, in order to satisfy the CT requirements for SCTs delivered via TLS.
What does this mean for CAs?
If you are embedding SCTs in your certificates, SCTs from this log for newly-issued certificates will no longer meet CT Compliance requirements stating that at least one SCT must come from a CT log that was Qualified, Usable, or ReadOnly at time of check. In order to ensure that newly-issued certificates will be CT-compliant, you should update your CT log configuration to remove the DigiCert Log Server while also ensuring that you are still logging a policy-satisfying set of CT logs after the removal.
While it is not required by policy, CAs with existing certificates embedding SCTs from this log may wish to proactively reissue affected certificates to increase the resilience of these certificates to possible future log incidents.
If you are embedding SCTs from this log in your OCSP responses, you must issue new OCSP responses before 2022-01-24, which replace these SCTs with SCTs issued from another non-Retired, non-Google log. Your customers must then begin to serve these new responses or provide a policy-satisfying set of SCTs via another mechanism.
What does this mean for Log Operators?
If you are operating a CT log not listed in the above Retirement announcement, you do not need to take any action.
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/6011b114-1a58-45a8-ab83-88cc7050e2d2n%40chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/217e6000-96d2-49b8-aba8-1210e558314an%40chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/10fbc80e-309c-4302-988e-1ad672604d79n%40chromium.org.