Hi ct-policy@,
Applications that use Chrome's CT log lists to enforce CT within their application risk breakage when Google makes necessary changes to our log list. This breakage causes not just pain for impacted applications, but also risks the safety and stability of Chrome's CT enforcement. Relying on Chrome's log lists without explicit permission from Google is a violation of Google's Acceptable Use Policy for our lists.
Google is rolling out changes to the log lists served to these CT-enforcing clients that decouple the log list used for Chrome from the log list used by unauthorized clients. As a result of these changes, unauthorized clients relying on these log lists for enforcement will need to make changes in order to avoid breakage. These changes target only those requests coming from unauthorized CT-enforcing clients, and will not impact requests to the v3 log list from CT log monitors, certificate submitters, or other members of the CT ecosystem.
First off, effective now, no additional CT logs will be added to the log lists served to impacted CT-enforcing clients. Applications enforcing CT using Chrome's log list will need to ensure that their applications use SCTs from the logs on these lists. As logs naturally turn down, it will gradually become more difficult to acquire the necessary SCTs to satisfy these applications' policies.
To make it possible to avoid breakage even after all logs included in the lists have been turned down, we will be adding two additional log "mimics" to these lists in the Usable state in the coming weeks. The "mimics" are just key pairs, and we're publishing the private keys. This provides a mechanism to acquire a policy-satisfying set of SCTs without incurring the burden of maintaining additional logs. These SCTs can be provided to impacted applications via the TLS extension or embedded directly in the certificate. Our hope is that CAs will be able to provide services to facilitate embedding these SCTs, and encourage CAs able to assist to chime in on this thread for easy reference.
Starting in July, Google will also perform a series of changes to the log lists served to CT-enforcing clients designed to temporarily break enforcing applications as an early warning sign to impacted developers. During these temporary breakages, the log lists will be reduced to include only the log mimics, ensuring that applications that take action to avoid breakage ahead of time will not be impacted.
These changes are described in more detail on our policy website.
Thank you to the many community members who have reached out privately with suggestions on our next steps, with a special thank you to Rob Stradling of Sectigo for suggesting the introduction of the log mimics.
Questions are very much welcome,
Joe, on behalf of the Chrome CT Team.
I'm not 100% clear on this, but what you're saying is you're fingerprinting clients (eg, by User-agent) and will serve a different version of the log list to them, which will include the two mimic logs?
Would you be willing to include the mimic logs in all_log_list.json (perhaps as retired, like the existing placeholder logs) so that those of us parsing SCTs using that file can easily identify the mimic SCTs?