"In the interest of transparency, Mozilla received a formal request from Taiwan’s Ministry of Digital Affairs (MODA), dated March 15, 2025, requesting that we delay the removal of the “websites” trust bit for Chunghwa Telecom’s ePKI Root CA, which is currently scheduled to occur on or about April 15, 2025, in accordance with Mozilla’s Root CA Lifecycles Transition Schedule.
MODA explained that the requested delay is intended to support the ongoing transition of government websites away from certificates issued by CHT’s GTLSCA-G1 subordinate CA. As we understand it, MODA is already implementing a short-term migration plan involving the dual issuance of approximately 12,000 new certificates for government websites—one from Chunghwa Telecom and one from Taiwan CA (TWCA)—to ensure continued availability of government services and minimize user disruption.
While we have not yet finalized a decision, we are currently contemplating:
We note that:
We welcome feedback on any of these approaches."
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/05d31347-d1c0-474d-9c2f-22778116c1c6n%40mozilla.org.
Hi Arabella,
Thanks for your comments on this topic. Unfortunately, the decision to remove the “websites” trust bit for several older root certificates—including the AAA Certificate Services Root—follows a long-standing transition plan that is publicly documented here: https://wiki.mozilla.org/CA/Root_CA_Lifecycles. We understand that changes like this can raise concerns. However, this transition has been in motion for quite some time. We appreciate everyone’s understanding as we continue to ensure the trustworthiness and security of the web.
Ben
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c0794245-c1c8-417c-a40e-a7154a4720d2n%40mozilla.org.
I'm very interested to hear the ecosystem risks for each of these choices. It feels that the order is correct in terms of risks but I'm more interested to hear what you and others feel about the 3rd option.
Best regards,
Dimitris.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/136da9cf-e967-401c-9cc9-d2031655d605n%40mozilla.org.
Hi Arabella,
I'm wondering if Chrome and Firefox have implemented the feature to automatically look up the trust anchor. From my tests (specifically, removing AAA Certificate Services locally), it seems that Chrome can perform this look-up, but Firefox cannot. However, I'm not entirely certain.
Generally speaking, Chrome’s certificate path discovery and validation behavior follows RFC 4158 and RFC 5280.
At a high-level, Chrome is capable of discovering paths using two approaches, either separately, or in combination:
Certificates provided by the server’s configuration during the TLS handshake.
Paths built from “chasing” certificates disclosed in the Authority Information Access (AIA) extension.
If Chrome can successfully build a valid path from a leaf to a root included in the Chrome Root Store using the certificates provided by the server, great - AIA does not need to be considered. While chasing AIA is considered less preferred due to performance concerns (e.g., bandwidth usage and time of discovery), it is a useful fallback in the event of server misconfigurations and cases like the example being discussed in this thread.
As a general note, I wanted to share some context for Chrome’s standard approach related to participating in MDSP. Out of respect for the Mozilla Root Program's distinct policy governance and decision-making processes, over the past few years, the Chrome Root Program team has generally focused our participation on broader community forums like pub...@ccadb.org. We feel this helps maintain clearer boundaries between program-specific discussions and related decisions made to improve security for those specific user communities. However, given the direct implications for website compatibility and user experience related to the AAA root removal – which also affects the Chrome Root Store due to our policy – we thought it was important to contribute to this specific conversation.
For added background on the Chrome Root Program’s approach, for all “term-limit” removals taking place from the Chrome Root Store we:
leveraged our internal PKI monitoring tooling to identify and evaluate the impact of our planned term-limit removals.
contacted affected CA Owners about 3 months ago, to remind them of the upcoming removal. In cases where we discovered time-valid server authentication certificates only capable of chaining to a “to-be-removed” root and whose validity extended past the planned removal date (April 15, 2025), we (1) confirmed the CA Owner’s understanding of the planned removal and (2) asked about their plans to transition affected subscribers to avoid potential breakage.
Most responses from CA Owners specifically indicated subscriber awareness of the upcoming changes and a signal that (a) subscribers have already replaced affected certificates, (b) subscribers had plans in place to replace the affected certificates before the removal, and/or (c) subscribers accepted the risk of continuing to rely on these certificates, where in some cases, use of the affected certificates would not be impacted.
Thanks,
Ryan
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/1057e65f-8768-4431-9889-a4eac1cf1747n%40mozilla.org.
Hi Dimitris,
I’m forking this to a new thread to separate from the delayed trust bit removal thread.
>Can you please share more details about the risks you see between the following options, for a Root CA with a hierarchy that no longer issues new end-entity certificates (OCSP responder certificates excluded) and all of its subscriber certificates have either been revoked or expired?
I want to clarify here that just because the trust bits are being removed from Mozilla/NSS and Chrome it doesn’t mean there won’t be some unexpired leaf certificates, or even new certificate issuance from the hierarchy for a small number of subscriber edge cases.
For the sake of this discussion, I’ll leave in the middle whether these edge cases are good or bad. We certainly see both. I also believe the WebPKI is currently in a more active transformational state, one where proper customer education about using the right PKI at the right location is more important than ever.
1. Utilizing distrust notAfter/notBefore modern browser methods
2. Removal of "trust bits"
3. Removal of the Root CA entirely, especially if there are no "trust bits" enabled.
I want to say here that we believe all three mechanisms should be utilized, in the correct order (frankly, the one you specified).
At this moment, number 2 and 3 are utilized by Mozilla for the scheduled deprecations due to CA key lifetimes. The main reason for this is the different removal dates for SMIME and TLS. As an example for a multipurpose root:
- 2025-04-15: TLS trust bit removal
- 2028-04-15: S/MIME trust bit removal / complete Root CA removal.
When looking at single purpose hierarchies, the direct Root CA removal could be the first step.
We would like to advocate adding the first option at the beginning of the process, changing the example to:
- 2024-04-15: DistrustAfter set for TLS and S/MIME
- 2025-04-15: TLS trust bit removal
- 2028-05-15: Complete Root CA removal
We believe this approach would help significantly to make root deprecations smoother for CAs and Subscribers alike.
What this change would essentially force is setting a single date for both TLS and S/MIME, after which any newly issued certificate won’t be trusted by Mozilla.
The issue we see currently is that certificates issued at the same time have different trust removal dates. As an example, with our AAA Certificate Services Root CA:
- A TLS certificate issued on 2025-01-15 for 200 days, after 3 months will stop being trusted.
- A TLS certificate issued on 2025-02-15 for 30 days, would be trusted for its entire lifetime.
- An S/MIME certificate issued on 2026-04-15 for 3 years, would have its trust removed after 2 years.
- An S/MIME certificate issued on 2027-04-15 for 1 year, would be trusted for its entire lifetime.
We believe (and have noticed in practice) that this easily leads to confusion, whereas having a single “DistrustAfter” date based on the notBefore date for all certificate types allows for more clarity.
Additionally, using “DistrustAfter” also has the benefit of showing a non-trusted state immediately after installation of a certificate, rather than (for the Subscriber and Relying Parties perspective) at a random moment.
While a CA could obviously choose to halt issuance early on a hierarchy to ensure all leaf certificates expire before the root removal date, that would no longer allow for the sorts of subscriber edge cases that I touched on above.
Regards,
Martijn
--
You received this message because you are subscribed to a topic in the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this topic, visit https://groups.google.com/a/mozilla.org/d/topic/dev-security-policy/uYAm_c_pfos/unsubscribe.
To unsubscribe from this group and all its topics, send an email to dev-security-po...@mozilla.org.
To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/c7ddab01-7145-4b87-a2c0-5532eca6675b%40it.auth.gr.
distrustAfter
dates for S/MIME roots.Hi Dimitris,
I’m forking this to a new thread to separate from the delayed trust bit removal thread.
>Can you please share more details about the risks you see between the following options, for a Root CA with a hierarchy that no longer issues new end-entity certificates (OCSP responder certificates excluded) and all of its subscriber certificates have either been revoked or expired?
I want to clarify here that just because the trust bits are being removed from Mozilla/NSS and Chrome it doesn’t mean there won’t be some unexpired leaf certificates, or even new certificate issuance from the hierarchy for a small number of subscriber edge cases.
For the sake of this discussion, I’ll leave in the middle whether these edge cases are good or bad. We certainly see both. I also believe the WebPKI is currently in a more active transformational state, one where proper customer education about using the right PKI at the right location is more important than ever.
1. Utilizing distrust notAfter/notBefore modern browser methods
2. Removal of "trust bits"
3. Removal of the Root CA entirely, especially if there are no "trust bits" enabled.
I want to say here that we believe all three mechanisms should be utilized, in the correct order (frankly, the one you specified).
At this moment, number 2 and 3 are utilized by Mozilla for the scheduled deprecations due to CA key lifetimes. The main reason for this is the different removal dates for SMIME and TLS. As an example for a multipurpose root:
- 2025-04-15: TLS trust bit removal
- 2028-04-15: S/MIME trust bit removal / complete Root CA removal.
When looking at single purpose hierarchies, the direct Root CA removal could be the first step.
We would like to advocate adding the first option at the beginning of the process, changing the example to:
- 2024-04-15: DistrustAfter set for TLS and S/MIME
- 2025-04-15: TLS trust bit removal
- 2028-05-15: Complete Root CA removal
We believe this approach would help significantly to make root deprecations smoother for CAs and Subscribers alike.
What this change would essentially force is setting a single date for both TLS and S/MIME, after which any newly issued certificate won’t be trusted by Mozilla.
The issue we see currently is that certificates issued at the same time have different trust removal dates. As an example, with our AAA Certificate Services Root CA:
- A TLS certificate issued on 2025-01-15 for 200 days, after 3 months will stop being trusted.
- A TLS certificate issued on 2025-02-15 for 30 days, would be trusted for its entire lifetime.
- An S/MIME certificate issued on 2026-04-15 for 3 years, would have its trust removed after 2 years.
- An S/MIME certificate issued on 2027-04-15 for 1 year, would be trusted for its entire lifetime.
We believe (and have noticed in practice) that this easily leads to confusion, whereas having a single “DistrustAfter” date based on the notBefore date for all certificate types allows for more clarity.
Additionally, using “DistrustAfter” also has the benefit of showing a non-trusted state immediately after installation of a certificate, rather than (for the Subscriber and Relying Parties perspective) at a random moment.
While a CA could obviously choose to halt issuance early on a hierarchy to ensure all leaf certificates expire before the root removal date, that would no longer allow for the sorts of subscriber edge cases that I touched on above.
Dear Ben,
Does firefox respect certificate's AIA Extension(Authority Information Access) like Ryan and chrome did?
It is important for cloudflare customers to reduce their lose those who installed SSL.com's non-cross-signed certificates chaining to AAA Certificate Services.