June 27th, 2024

Sustaining Digital Certificate Security – Entrust Certificate Distrust

Google's Chrome Security Team distrusts specific Entrust certificates due to reliability concerns. Chrome 127 onwards won't trust certain Entrust TLS server authentication certificates dated after October 31, 2024. Website operators should review certificates for compliance.

Read original articleLink Icon
Sustaining Digital Certificate Security – Entrust Certificate Distrust

Google's Chrome Security Team has announced the distrust of certain Entrust certificates due to a pattern of concerning behaviors that have eroded confidence in their reliability. Starting from Chrome 127, TLS server authentication certificates from specific Entrust roots with SCTs dated after October 31, 2024, will no longer be trusted by default. This action aims to maintain the integrity of the Web PKI ecosystem. Website operators are advised to review their certificates to ensure compliance. Enterprises using Entrust certificates internally can override these constraints by locally trusting the root CA certificate. The blocking action will begin on November 1, 2024, affecting certificates issued thereafter. Chrome users visiting websites with affected certificates after this date will see a full-page interstitial warning. Other Google products may also implement similar updates in the future.

Link Icon 23 comments
By @bpfrh - 5 months
There is a more detailed statement in the chrome CCADB Public group:

https://groups.google.com/a/ccadb.org/g/public/c/29CRLOPM6OM...

By @xeeeeeeeeeeenu - 5 months
It always fascinates me when this happens. Don't the CAs understand that the browser vendors can and will kill their business if they don't comply with the rules? It's not like a fine that can be ignored.

How dysfunctional does a company have to be to let this happen?

By @mikeiz404 - 5 months
> This approach attempts to minimize disruption to existing subscribers using a recently announced Chrome feature to remove default trust based on the SCTs (signed certificate timestamps) in certificates.

I was wondering how Chrome was able to revoke a certificate based on time without trusting the CA to not back date certificates and it looks like this is due to being able to trust certificate transparency logs instead. This is where they get the signed certificate timestamps (SCT) from.

See also https://certificate.transparency.dev/howctworks/

By @aaomidi - 5 months
I’m one of the people who really went in depth with Entrust (Amir on Bugzilla).

I’m also an author on https://webpki.substack.com. I will be writing my thoughts on the distrust soon.

I can try to answer any questions folks may have. I can also help folks find ways they can also be involved!

Root programs can only do so much and need surveillance of the CAs from the community.

By @zX41ZdbW - 5 months
The list of affected websites, just in case: https://pastila.nl/?000882d6/bed25fdc842914abbc89e528012a961...
By @1oooqooq - 5 months
All the google root security team's due diligence email are just a list of links to firefox's bugzilla who documented and followed up on all the issues.

https://groups.google.com/a/ccadb.org/g/public/c/29CRLOPM6OM...

By @dextercd - 5 months
I wonder if Entrust can survive this. Even if Web-PKI doesn't account for the majority of their income (which it might, I genuinely don't know) this is a huge blow to their credibility.

And for a CA, credibility is everything

By @amluto - 5 months
> Additionally, should a Chrome user or enterprise explicitly trust any of the above certificates on a platform and version of Chrome relying on the Chrome Root Store (e.g., explicit trust is conveyed through a Group Policy Object on Windows), the SCT-based constraints described above will be overridden and certificates will function as they do today.

This continues to annoy me. Chrome (and other browsers) have detailed trust constraints, e.g. SCTNotAfter, in their own root stores. Why can’t administrators do the same thing?

By @nahikoa - 5 months
The issues identified really show a dumpster fire: https://bugzilla.mozilla.org/buglist.cgi?o2=greaterthaneq&sh...

Directly from Entrust: "Yes, there has been ongoing internal discussion and reflection on the issues found in this and other incidents, which has led to the action items described previously and ongoing changes, including the decision to revoke the certificates affected by this bug. Exceptional circumstances would need to be provided and justified by the Subscribers. Given the nature of the feedback we have received to date, we doubt that the community has any real interest in anything that Entrust could suggest, except to use against Entrust in a destructive, not constructive, way. We therefore would like more explicit and clear guidelines or a definition of “exceptional circumstances” to be adopted and applied equally to all CAs, perhaps through updates in the CA/B Forum requirements."

https://bugzilla.mozilla.org/show_bug.cgi?id=1888714

By @kseifried - 5 months
Entrust has BIMI certs which use a different root (CN = Entrust Verified Mark Root Certification Authority - VMCR1) and for which your choices of a BIMI certificate are: Entrust or Digicert. I doubt it makes as much money as their web certs (BIMI certs are not super common, and they are expensive to issue since there's an actual validation process that typically involves a public notary validating the ID of a corporate officer). If you believe https://bimiradar.com/glob

it looks like Entrust is selling on the order of a few dozen certs a week to maybe upwards of 100-200.

EDIT: I've asked Google if Gmail will be discontinuing support for Entrusts VMC certificate (and thus BIMI logos), I would guess not since BIMI has some actual requirements, but assumptions are not the best way to make decisions about risk (like our BIMI logo not working later this fall).

By @lambdaone - 5 months
I've always thought that company names like "Entrust" are hostages to fortune, daring the Fates to intervene. In this case the Fates are the browser vendors.

There's now also the problem of competing with a free alternative that increasingly almost everyone knows about.

By @rxu - 5 months
Can someone ELI5 what the violations linked in the first line are? They seem pretty minor to me but I don't understand certs
By @Animats - 5 months
"Entrust encrypts and secures more than 24 million Swift messages daily."

Wonder how secure that is? That has real potential for extracting value.

By @crazysim - 5 months
Some popular users:

chase.com aa.com

By @noname120 - 5 months
The real question is: why didn't they get booted out earlier?
By @Tfoote01 - 5 months
I worked there. It doesn't surprise me at all!
By @ranger_danger - 5 months
I wonder what the chances are that some government has compromised one of the many "trusted" CA certs used by all browsers on earth?
By @dextercd - 5 months
Has there been any public comment about this from Entrust yet?
By @cedws - 5 months
I wonder which root CA the intelligence agencies use to selectively MITM TLS traffic a la Crypto AG.