Upcoming April 2026 NSS Root Store Changes (Bug 2017317)

87 views
Skip to first unread message

Ben Wilson

unread,
Apr 8, 2026, 2:35:21 PM (12 days ago) Apr 8
to dev-secur...@mozilla.org

Greetings,

Mozilla will be making several root store changes in its April 2026 NSS release, as tracked in Bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=2017317.

Context and Rationale

These changes are part of Mozilla’s ongoing root store maintenance under the Mozilla Root Store Policy (MRSP), including §7.4 (Root CA Lifecycles) and §7.5.3 (Transition Plans). They reflect a combination of lifecycle-based transitions, CA operator requests, and alignment with intended certificate usage, including retiring older or less suitable root certificates, enforcing clear separation of trust purposes (e.g., TLS vs. S/MIME), and reducing unnecessary trust surface in the Web PKI ecosystem. Collectively, these actions help to ensure that root certificates are relied upon only for their intended and actively maintained use cases, or are retired in accordance with established distrust timelines.

Summary of Changes

The following updates are planned (SHA256-based crt.sh certificate lookups are linked below):

Trust Bit Modifications (MRSP §7.5.3 and CA Requests)

  • Google Trust Services (GTS / GSR):

    • GTS R1, R3, R4, GSR4: remove email trust bit

    • GTS R2: remove websites trust bit

  • Amazon:

    • Amazon Root CA 1, 2, 3, and 4: remove email trust bit

  • Sectigo:

    • Entrust Root CA – G2 and EC1: remove websites trust bit

Lifecycle-Based Websites Trust Bit Removal (MRSP §7.4)

Full Root Removals (MRSP §7.4 and CA Requests)

The table further below also lists some of the affected root certificates with their SHA-256 (crt.sh) references, maps them to corresponding replacement roots, and provides the NSS and Firefox versions (with release dates) in which the replacement roots were first included.

Advice for Subscribers and Relying Parties

At a fundamental level, client systems must be able to successfully build a certificate chain to a root certificate that remains trusted for the intended purpose. Changes to trust bits or root removal will affect which chains are considered valid for updated clients, and deployments must be updated accordingly.  Subscribers and relying parties are strongly advised to take the following actions before these changes take effect:

  • Ensure relying parties are migrated to up-to-date root stores in a timely manner.

  • Do not pin particular certificates, or if pinning must be employed, disable it automatically when a relying party’s root store becomes stale. 

  • Subscribers should ensure their certificates chain back to modern trusted roots. If compatibility with relying parties with out-of-date root stores is essential, subscribers should serve cross-signed certificate chains which will be trusted by both new and old clients. 

  • Test against current and upcoming root store configurations - Implementers should validate their configurations to ensure compatibility with the changes mentioned here.

Closing

Mozilla will continue to evolve its root store to improve security, reduce complexity, and align trust with real-world usage. These changes are part of that ongoing effort to ensure a more predictable and resilient ecosystem.

If you have questions or identify potential impact, please raise them here on this list or contact the Mozilla root program at certif...@mozilla.org.

Thanks,
Ben Wilson
Mozilla Root Program


Affected Root CA Certificates (Full Removal or Websites Trust Bit Removal)

Affected Root

SHA-256 (crt.sh) of Affected Root

Replacement Root

NSS Ver.

Ffox Ver.

Release Date

FULL ROOT REMOVALS

 

MIGRATION PATH



 

XRamp Global CA Root

https://crt.sh/?sha256=CECDDC905099D8DADFC5B1D209B737CBE2C18CFB2C10C0FF0BCF0D3286FC1AA2

(None / migrate)

 

 

 

SecureTrust CA

https://crt.sh/?sha256=F1C1B50AE5A20DD8030EC9F6BC24823DD367B5255759B4E71B61FCE9F7375D73

(None / migrate)

 

 

 

Secure Global CA

https://crt.sh/?sha256=4200F5043AC8590EBB527D209ED1503029FBCBD41CA1B506EC27F15ADE7DAC69

(None / migrate)

 

 

 

Trustwave Global Certification Authority

https://crt.sh/?sha256=97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8

(None / migrate)

 

 

 

Trustwave Global ECC P256 Certification Authority

https://crt.sh/?sha256=945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4

(None / migrate)

 

 

 

Trustwave Global ECC P384 Certification Authority

https://crt.sh/?sha256=55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097

(None / migrate)

 

 

 

TeliaSonera Root CA v1

https://crt.sh/?sha256=DD6936FE21F8F077C123A1A521C12224F72255B73E03A7260693E8A24B0FA389

Telia Root CA v2

NSS 3.77

100

Mar-22

GLOBALTRUST 2020

https://crt.sh/?sha256=9A296A5182D1D451A2E37F439B74DAAFA267523329F90F9A0D2007C334E23C9A

(None / migrate)

 

 

 

AffirmTrust Commercial

https://crt.sh/?sha256=0376AB1D54C5F9803CE4B2E201A0EE7EEF7B57B636E8A93C9B8D4860C96F5FA7

(None / migrate)

 

 

 

AffirmTrust Networking

https://crt.sh/?sha256=0A81EC5A929777F145904AF38D5D509F66B5E2C58FCDB531058B0E17F3F0B41B

(None / migrate)

 

 

 

AffirmTrust Premium

https://crt.sh/?sha256=70A73F7F376B60074248904534B11482D5BF0E698ECC498DF52577EBF2E93B9A

(None / migrate)

 

 

 

AffirmTrust Premium ECC

https://crt.sh/?sha256=BD71FDF6DA97E4CF62D1647ADD2581B07D79ADF8397EB4ECBA9C5E8488821423

(None / migrate)

 

 

 

certSIGN ROOT CA

https://crt.sh/?sha256=EAA962C4FA4A6BAFEBE415196D351CCD888D4F53F3FA8AE6D7C466A94E6042BB

certSIGN ROOT CA G2

NSS 3.54

79

Jun-20

FIRMAPROFESIONAL CA ROOT-A WEB

https://crt.sh/?sha256=BEF256DAF26E9C69BDEC1602359798F3CAF71821A03E018257C53C65617F3D4A

(None / migrate)

 

 

 

 

 

 

 

 

 

WEBSITES TRUST BIT REMOVALS

 

MIGRATION PATH



 

Entrust Root CA – G2

https://crt.sh/?sha256=43DF5774B03E7FEF5FE40D931A7BEDF1BB2E6B42738C4E6D3841103D3AA7F339

Sectigo Public Server Authentication Roots R46 or E46

NSS 3.92

117

Jul-23

Entrust Root CA – EC1

https://crt.sh/?sha256=02ED0EB28C14DA45165C566791700D6451D7FB56F0B2AB1D3B8EB070E56EDFF5

Sectigo Public Server Authentication Roots R46 or E46

NSS 3.92

117

Jul-23

COMODO Certification Authority

https://crt.sh/?sha256=0C2CD63DF7806FA399EDE809116B575BF87989F06518F9808C860503178BAF66

Sectigo Public Server Authentication Roots R46 or E46

NSS 3.92

117

Jul-23

CN=“Certigna”

https://crt.sh/?sha256=E3B6A2DB2ED7CE48842F7AC53241C7B71D54144BFB40C11F3F1D0B42F5EEA12D

CN=”Certigna Root CA”

NSS 3.41

65

Dec-18

SwissSign Gold CA – G2

https://crt.sh/?sha256=62DD0BE9B9F50A163EA0F8E75C053B1ECA57EA55C8688F647C6881F2C8357B95

SwissSign RSA TLS Root CA 2022 – 1

NSS 3.114

142

Jul-25

DigiCert Assured ID Root CA

https://crt.sh/?sha256=3E9099B5015E8F486C00BCEA9D111EE721FABA355A89BCF1DF69561E3DC6325C

DigiCert Global Root G2

NSS 3.16.3

32

Jul-14

DigiCert Global Root CA

https://crt.sh/?sha256=4348A0E9444C78CB265E058D5E8944B4D84F9662BD26DB257F8934A443C70161

DigiCert Global Root G2

NSS 3.16.3

32

Jul-14

DigiCert High Assurance EV Root CA

https://crt.sh/?sha256=7431E5F4C3C1CE4690774F0B61E05440883BA9A01ED00BA6ABD7806ED3B118CF

DigiCert Global Root G2

NSS 3.16.3

32

Jul-14

QuoVadis Root CA 2

https://crt.sh/?sha256=85A0DD7DD720ADB7FF05F83D542B209DC7FF4528F7D677B18389FEA5E5C49E86

DigiCert Global Root G2

NSS 3.16.3

32

Jul-14

QuoVadis Root CA 3

https://crt.sh/?sha256=18F1FC7F205DF8ADDDEB7FE007DD57E3AF375A9C4D8D73546BF4F1FED1E18D35

DigiCert Global Root G2

NSS 3.16.3

32

Jul-14

Izenpe.com   (distrustAfter: 2026-04-15)

https://crt.sh/?sha256=2530CC8E98321502BAD96F9B1FBA1B099E2D299E0F4548BB914F363BC0D4531F

(None / migrate)

 

 

 



Reply all
Reply to author
Forward
0 new messages