pwshub.com

Mozilla follows Google in distrusting Entrust’s TLS certs

Mozilla is following in Google Chrome's footsteps in officially distrusting Entrust as a root certificate authority (CA) following what it says was a protracted period of compliance failures.

A little over a month ago, Google was the first to make the bold step of dropping Entrust as a CA, saying it noted a "pattern of concerning behaviors" from the company.

Entrust has apologized to Google, Mozilla, and the wider web community, outlining its plans to regain the trust of browsers, but these appear to be unsatisfactory to both Google and Mozilla.

In an email shared by Mozilla's Ben Wilson on Wednesday, the root store manager said the decision wasn't taken lightly, but equally Entrust's response to Mozilla's concerns didn't inspire confidence that the situation would materially change for the better.

"Mozilla previously requested that Entrust provide a detailed report on these recent incidents and their root causes, an evaluation of Entrust's recent actions in light of their previous commitments given in the aftermath of similarly serious incidents in 2020, and a proposal for how Entrust will re-establish Mozilla's and the community's trust," said Wilson.

"Although Entrust's updated report made an effort to engage with these issues, the commitments given in the report were not meaningfully different from the previous commitments which were given in 2020 and broken in the recent incidents.

"Ultimately, the proposed plan was not sufficient to restore trust in Entrust's operation. Re-establishing trust requires a candid and clear accounting of failures and their root causes, a detailed and credible plan for how they can be addressed, and concrete commitments based on objective and externally measurable criteria."

Wilson also cited a separate document that amalgamated the "substantial number of compliance incidents" at Entrust as cause for concern.

Between just March and May this year, Mozilla made note of 22 separate incidents, many of which related to various delays and missed deadlines.

The Register contacted Entrust for a response, but it didn't immediately respond.

However, Bruce Morton, director of certificate services and Entrust, responded to Wilson's post directly, echoing its previous commitment to regaining the trust of major browsers.

"Ben, we are disappointed by this decision but want to reaffirm Entrust's commitment to continued execution of our improvement plan and re-establishing confidence with Mozilla and the Web PKI community," he said.

"We also appreciate your support and endorsement of our plan to continue to operate as a delegated RA through our partnership with SSL.com. We'll continue to provide updates here on both fronts."

What Morton is referring to here is Entrust's solution to maintaining relevance in the CA space, which involves partnering with SSL.com, whose certs are still trusted by Chrome et al, and essentially becoming a reseller, allowing its customers to stay with the company should they wish to.

SSL.com certs bought through Entrust will still read "Entrust" in customers' browsers and customer support will be managed through the company too. SSL.com will just be the provider, making Entrust a registration authority (RA) rather than a CA.

  • More than 83K certs from nearly 7K DigiCert customers must be swapped out now
  • DigiCert gives unlucky folks 24 hours to replace doomed certificates after code blunder
  • Google cuts ties with Entrust in Chrome over trust issues
  • Bad eIDAS: Europe ready to intercept, spy on your encrypted HTTPS connections

However, customers have already pointed out in various online discussions that the premium Entrust is charging on these SSL.com certs is something to behold. For example, an Organization Validation Wildcard cert – a certificate that secures multiple sub domain names linked to the same base domain (by using a wildcard character * in the domain name field) – costs $299 bought directly from SSL.com if buying only for one year, whereas buying the same cert through Entrust costs $799.

Regarding this move, Wilson said: "We support this arrangement, recognizing that SSL.com, as the operator of the root CA within Mozilla's root CA program, will be responsible for domain validation, certificate issuance, and revocation, and ultimately, for any incidents that may occur."

Mozilla will officially stop trusting certificates issued by Entrust after November 30, 2024. Any issued before then will continue to be trusted, but anything after won't be, unless they're purchased from SSL.com via Entrust.

"We hope Entrust will work to address the root causes of these incidents and so eventually re-establish confidence in its internal policies and processes, its tooling and technology, and its commitment to the Web PKI community," Wilson added.

Google's cutoff is a month sooner than Mozilla's – any certificate issued after October 31 won't be trusted by Chrome 127.

"Certification authorities serve a privileged and trusted role on the internet that underpin encrypted connections between browsers and websites," Google said last month. "With this tremendous responsibility comes an expectation of adhering to reasonable and consensus-driven security and compliance expectations, including those defined by the CA/Browser TLS Baseline Requirements.

"Over the past six years, we have observed a pattern of compliance failures, unmet improvement commitments, and the absence of tangible, measurable progress in response to publicly disclosed incident reports. When these factors are considered in aggregate and considered against the inherent risk each publicly trusted CA poses to the internet ecosystem, it is our opinion that Chrome's continued trust in Entrust is no longer justified." ®

Source: theregister.com

Related stories
1 month ago - Sectigo bosses claim it's only a matter of time before Microsoft and Apple drop Big E from their root stores too After falling down in the estimations of major browser makers Google and Mozilla, Entrust faces a lengthy fight on its hands...
1 month ago - Will you see the Lite? Back in June, Google's Chrome Web Store began alerting users of uBlock Origin who had developer-oriented versions of Chrome that the popular ad-filtering extension could soon stop working.…
1 week ago - What happens at Black Hat… While trying to escape the Las Vegas heat during Black Hat last month, watchTowr Labs researchers decided to poke around for weaknesses in the WHOIS protocol. They claim to have found a way to undermine...
1 month ago - Web giant to seek second opinion after bench labels biz 'a monopolist' in DoJ win Google's payments to make its search engine the default for smartphone browsers and elsewhere violate US antitrust law, a federal judge ruled Monday.…
1 month ago - New Display settings let you modify the resolution, refresh rate, and monitor orientation. There's also a new RTX Video enhancements section for converting SDR video playing in your browser into HDR.Read Entire Article
Other stories
37 minutes ago - Experts at the Netherlands Institute for Radio Astronomy (ASTRON) claim that second-generation, or "V2," Mini Starlink satellites emit interference that is a staggering 32 times stronger than that from previous models. Director Jessica...
37 minutes ago - The PKfail incident shocked the computer industry, exposing a deeply hidden flaw within the core of modern firmware infrastructure. The researchers who uncovered the issue have returned with new data, offering a more realistic assessment...
37 minutes ago - Nighttime anxiety can really mess up your ability to sleep at night. Here's what you can do about it right now.
37 minutes ago - With spectacular visuals and incredible combat, I cannot wait for Veilguard to launch on Oct. 31.
37 minutes ago - Finding the perfect pair of glasses is difficult, but here's how to do so while considering your face shape, skin tone, lifestyle and personality.