Mozilla follows Google in losing trust in Entrust's TLS certificates
Mozilla will stop trusting Entrust as a root certificate authority after November 30, 2024, following compliance failures. Google previously made a similar decision, citing inadequate responses from Entrust.
Read original articleMozilla has decided to distrust Entrust as a root certificate authority (CA), following Google's similar action due to ongoing compliance failures. Google initially dropped Entrust, citing a "pattern of concerning behaviors." Entrust has acknowledged these issues and expressed intentions to regain trust, but both Google and Mozilla found its responses inadequate. Mozilla's root store manager, Ben Wilson, indicated that Entrust's recent commitments were not significantly different from previous ones that had been broken. Mozilla documented 22 compliance incidents from March to May 2024, raising further concerns. Entrust's director of certificate services, Bruce Morton, expressed disappointment over Mozilla's decision but reiterated the company's commitment to an improvement plan and its partnership with SSL.com, which will allow Entrust to continue offering digital certificates as a registration authority. Mozilla will cease trusting Entrust-issued certificates after November 30, 2024, while Google will stop trusting them a month earlier. Certificates issued before these dates will remain valid, but any issued afterward will only be trusted if purchased through SSL.com via Entrust. Mozilla emphasized the need for Entrust to address the root causes of its compliance issues to restore confidence in its operations. The situation highlights the critical role of certification authorities in maintaining secure internet connections and the expectations for adherence to security and compliance standards.
Related
Sustaining Digital Certificate Security – Entrust Certificate Distrust
Google's Chrome Security Team distrusts specific Entrust certificates due to reliability concerns. Chrome 127 onwards won't trust certain Entrust TLS server authentication certificates dated after October 31, 2024. Website operators should review certificates for compliance.
Chrome will distrust CA certificates from Entrust later this year
Google will stop trusting Entrust CA certificates from November 1, citing compliance failures. Websites using Entrust certs, like moneygram.com and ey.com, must switch to a new CA to avoid security warnings. Enterprise customers can still trust Entrust.
Entrust certificates will not be trusted in Chrome 127+
The Chrome Root Program Policy is updating trust for Entrust CAs due to compliance issues. Entrust must show improvement to maintain trust. Chrome will oversee changes to safeguard users and the web.
Deutsche Telekom issued invalid certificates, hasn't revoked them since 6 months
Telekom Security faced delays in revoking TLS certificates, impacting critical infrastructures. Efforts were made to replace 336 certificates within 5 days, highlighting the need for faster procedures and customer sensitization. Mozilla raised concerns about the response, emphasizing the importance of compliance with industry standards.
Intent to End OCSP Service
Let's Encrypt will discontinue OCSP in favor of CRLs to enhance privacy. This change won't affect website visitors but may impact non-browser software. Users relying on OCSP are advised to prepare for the transition.
Related
Sustaining Digital Certificate Security – Entrust Certificate Distrust
Google's Chrome Security Team distrusts specific Entrust certificates due to reliability concerns. Chrome 127 onwards won't trust certain Entrust TLS server authentication certificates dated after October 31, 2024. Website operators should review certificates for compliance.
Chrome will distrust CA certificates from Entrust later this year
Google will stop trusting Entrust CA certificates from November 1, citing compliance failures. Websites using Entrust certs, like moneygram.com and ey.com, must switch to a new CA to avoid security warnings. Enterprise customers can still trust Entrust.
Entrust certificates will not be trusted in Chrome 127+
The Chrome Root Program Policy is updating trust for Entrust CAs due to compliance issues. Entrust must show improvement to maintain trust. Chrome will oversee changes to safeguard users and the web.
Deutsche Telekom issued invalid certificates, hasn't revoked them since 6 months
Telekom Security faced delays in revoking TLS certificates, impacting critical infrastructures. Efforts were made to replace 336 certificates within 5 days, highlighting the need for faster procedures and customer sensitization. Mozilla raised concerns about the response, emphasizing the importance of compliance with industry standards.
Intent to End OCSP Service
Let's Encrypt will discontinue OCSP in favor of CRLs to enhance privacy. This change won't affect website visitors but may impact non-browser software. Users relying on OCSP are advised to prepare for the transition.