Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    The STING-activating nanofactory relieves T cell exhaustion in Mn-based tumor immunotherapy by regulating mitochondrial dysfunction | Journal of Nanobiotechnology

    June 3, 2025

    Teaching AI models what they don’t know | MIT News

    June 3, 2025

    Sophos Named a 2025 Gartner® Peer Insights™ Customers’ Choice for both Endpoint Protection Platforms and Extended Detection and Response

    June 3, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Google Online Security Blog: Sustaining Digital Certificate Security
    IT/ Cybersecurity

    Google Online Security Blog: Sustaining Digital Certificate Security

    big tee tech hubBy big tee tech hubJune 1, 2025026 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Google Online Security Blog: Sustaining Digital Certificate Security
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Posted by Chrome Root Program, Chrome Security Team

    Note: Google Chrome communicated its removal of default trust of Chunghwa Telecom and Netlock in the public forum on May 30, 2025.

    The Chrome Root Program Policy states that Certification Authority (CA) certificates included in the Chrome Root Store must provide value to Chrome end users that exceeds the risk of their continued inclusion. It also describes many of the factors we consider significant when CA Owners disclose and respond to incidents. When things don’t go right, we expect CA Owners to commit to meaningful and demonstrable change resulting in evidenced continuous improvement.

    Chrome’s confidence in the reliability of Chunghwa Telecom and Netlock as CA Owners included in the Chrome Root Store has diminished due to patterns of concerning behavior observed over the past year. These patterns represent a loss of integrity and fall short of expectations, eroding trust in these CA Owners as publicly-trusted certificate issuers trusted by default in Chrome. To safeguard Chrome’s users, and preserve the integrity of the Chrome Root Store, we are taking the following action.

    Upcoming change in Chrome 139 and higher:

    • Transport Layer Security (TLS) server authentication certificates validating to the following root CA certificates whose earliest Signed Certificate Timestamp (SCT) is dated after July 31, 2025 11:59:59 PM UTC, will no longer be trusted by default.
      • OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co., Ltd.,C=TW
      • CN=HiPKI Root CA – G1,O=Chunghwa Telecom Co., Ltd.,C=TW
      • CN=NetLock Arany (Class Gold) Főtanúsítvány,OU=Tanúsítványkiadók (Certification Services),O=NetLock Kft.,L=Budapest,C=HU
    • TLS server authentication certificates validating to the above set of roots whose earliest SCT is on or before July 31, 2025 11:59:59 PM UTC, will be unaffected by this change.

    This approach attempts to minimize disruption to existing subscribers using a previously announced Chrome feature to remove default trust based on the SCTs in certificates.

    Additionally, should a Chrome user or enterprise explicitly trust any of the above certificates on a platform and version of Chrome relying on the Chrome Root Store (e.g., explicit trust is conveyed through a Group Policy Object on Windows), the SCT-based constraints described above will be overridden and certificates will function as they do today.

    To further minimize risk of disruption, website operators are encouraged to review the “Frequently Asked Questions” listed below.

    Why is Chrome taking action?

    CAs serve a privileged and trusted role on the internet that underpin encrypted connections between browsers and websites. With this tremendous responsibility comes an expectation of adhering to reasonable and consensus-driven security and compliance expectations, including those defined by the CA/Browser Forum TLS Baseline Requirements.

    Over the past several months and years, we have observed a pattern of compliance failures, unmet improvement commitments, and the absence of tangible, measurable progress in response to publicly disclosed incident reports. When these factors are considered in aggregate and considered against the inherent risk each publicly-trusted CA poses to the internet, continued public trust is no longer justified.

    When will this action happen?

    The action of Chrome, by default, no longer trusting new TLS certificates issued by these CAs will begin on approximately August 1, 2025, affecting certificates issued at that point or later.

    This action will occur in Versions of Chrome 139 and greater on Windows, macOS, ChromeOS, Android, and Linux. Apple policies prevent the Chrome Certificate Verifier and corresponding Chrome Root Store from being used on Chrome for iOS.

    What is the user impact of this action?

    By default, Chrome users in the above populations who navigate to a website serving a certificate from Chunghwa Telecom or Netlock issued after July 31, 2025 will see a full page interstitial similar to this one.

    Certificates issued by other CAs are not impacted by this action.

    How can a website operator tell if their website is affected?

    Website operators can determine if they are affected by this action by using the Chrome Certificate Viewer.

    Use the Chrome Certificate Viewer

    • Navigate to a website (e.g., https://www.google.com)
    • Click the “Tune” icon
    • Click “Connection is Secure”
    • Click “Certificate is Valid” (the Chrome Certificate Viewer will open)
      • Website owner action is not required, if the “Organization (O)” field listed beneath the “Issued By” heading does not contain “Chunghwa Telecom” , “行政院” , “NETLOCK Ltd.”, or “NETLOCK Kft.”
      • Website owner action is required, if the “Organization (O)” field listed beneath the “Issued By” heading contains “Chunghwa Telecom” , “行政院” , “NETLOCK Ltd.”, or “NETLOCK Kft.”

    What does an affected website operator do?

    We recommend that affected website operators transition to a new publicly-trusted CA Owner as soon as reasonably possible. To avoid adverse website user impact, action must be completed before the existing certificate(s) expire if expiry is planned to take place after July 31, 2025.

    While website operators could delay the impact of blocking action by choosing to collect and install a new TLS certificate issued from Chunghwa Telecom or Netlock before Chrome’s blocking action begins on August 1, 2025, website operators will inevitably need to collect and install a new TLS certificate from one of the many other CAs included in the Chrome Root Store.

    Can I test these changes before they take effect?

    Yes.

    A command-line flag was added beginning in Chrome 128 that allows administrators and power users to simulate the effect of an SCTNotAfter distrust constraint as described in this blog post.

    How to: Simulate an SCTNotAfter distrust

    1. Close all open versions of Chrome

    2. Start Chrome using the following command-line flag, substituting variables described below with actual values

    –test-crs-constraints=$[Comma Separated List of Trust Anchor Certificate SHA256 Hashes]:sctnotafter=$[epoch_timestamp]

    3. Evaluate the effects of the flag with test websites

    Learn more about command-line flags here.

    I use affected certificates for my internal enterprise network, do I need to do anything?

    Beginning in Chrome 127, enterprises can override Chrome Root Store constraints like those described in this blog post by installing the corresponding root CA certificate as a locally-trusted root on the platform Chrome is running (e.g., installed in the Microsoft Certificate Store as a Trusted Root CA).

    How do enterprises add a CA as locally-trusted?

    Customer organizations should use this enterprise policy or defer to platform provider guidance for trusting root CA certificates.

    What about other Google products?

    Other Google product team updates may be made available in the future.





    Source link

    Blog certificate Digital Google Online Security Sustaining
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Sophos Named a 2025 Gartner® Peer Insights™ Customers’ Choice for both Endpoint Protection Platforms and Extended Detection and Response

    June 3, 2025

    Russian hackers targeted UK Ministry of Defence

    June 2, 2025

    Exploit details for max severity Cisco IOS XE flaw now public

    June 1, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    The STING-activating nanofactory relieves T cell exhaustion in Mn-based tumor immunotherapy by regulating mitochondrial dysfunction | Journal of Nanobiotechnology

    June 3, 2025

    Teaching AI models what they don’t know | MIT News

    June 3, 2025

    Sophos Named a 2025 Gartner® Peer Insights™ Customers’ Choice for both Endpoint Protection Platforms and Extended Detection and Response

    June 3, 2025

    European cloud providers play the sovereign card

    June 3, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    The STING-activating nanofactory relieves T cell exhaustion in Mn-based tumor immunotherapy by regulating mitochondrial dysfunction | Journal of Nanobiotechnology

    June 3, 2025

    Teaching AI models what they don’t know | MIT News

    June 3, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.