Skip to content

Commit a11ba23

Browse files
authored
Fix link behavior (#4)
Links in Markdown should function in preview and on the site.
1 parent b5ff592 commit a11ba23

9 files changed

+231
-182
lines changed

README.md

+8
Original file line numberDiff line numberDiff line change
@@ -23,3 +23,11 @@ The site is deployed on commits to `main`. To add a new policy revision:
2323
- Update `content/index.md` with the new content.
2424

2525
This can all be done in a single pull request. The diff in the PR will show the diff between the two policy versions.
26+
27+
### A note on links
28+
29+
Links in Markdown to other documents in this repository should end in `md`, e.g.
30+
`[Policy](index.md)`. Links in raw HTML, e.g. `<a
31+
href=/moving-forward-together`> should not. This make the links in the Github UI
32+
work for Markdown, and results in a correctly-compiled site. Hardcoded HTML
33+
links will not resolve correctly in previews.

content/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The Chrome Root Program Policy below establishes the minimum requirements for CA
5555

5656
### Apply for Inclusion
5757

58-
CA Owners that satisfy the requirements defined in the policy below may apply for self-signed root CA certificate inclusion in the Chrome Root Store using [these](apply-for-inclusion) instructions.
58+
CA Owners that satisfy the requirements defined in the policy below may apply for self-signed root CA certificate inclusion in the Chrome Root Store using [these](apply-for-inclusion.md) instructions.
5959

6060
### Chrome's Ongoing Commitment to Transport Security
6161

@@ -72,7 +72,7 @@ Chrome maintains a variety of mechanisms to protect its users from certificates
7272

7373
The "Moving Forward, Together" initiative envisions a future Web PKI that includes modern, reliable, highly agile, purpose-driven PKIs with an emphasis on automation, simplicity, and security.
7474

75-
Learn more about priorities and initiatives that may influence future versions of this policy [here](moving-forward-together). Please note "Moving Forward, Together" is future looking and does not describe normative requirements.
75+
Learn more about priorities and initiatives that may influence future versions of this policy [here](moving-forward-together.md). Please note "Moving Forward, Together" is future looking and does not describe normative requirements.
7676

7777
### Additional Information
7878

content/policy-archive/policy-version-1-0.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
## Archive Notice
1+
## Archive Notice
22

33
<p><strong><span style="color:#FF0000">IMPORTANT:</span></strong> This page is
4-
retained for historical purposes only.
5-
6-
Version 1.0 of the Chrome Root Program Policy was superseded by Version <a href=/Home/chromium-security/root-ca-policy/policy-archive/version-1-1/>1.1</a> on June 1, 2022.
7-
4+
retained for historical purposes only.
5+
6+
Version 1.0 of the Chrome Root Program Policy was superseded by Version [1.1](./policy-version-1-1.md) on June 1, 2022.
7+
88
For the latest version of the Chrome Root Program Policy, see <a href="https://g.co/chrome/root-policy">https://g.co/chrome/root-policy</a>.</p>
99

1010
## Introduction

content/policy-archive/policy-version-1-1.md

+36-36
Large diffs are not rendered by default.

content/policy-archive/policy-version-1-2.md

+36-36
Large diffs are not rendered by default.

content/policy-archive/policy-version-1-3.md

+18-18
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
## Archive Notice
1+
## Archive Notice
22

3-
<p><strong><span style="color:#FF0000">IMPORTANT:</span></strong> This page is retained for historical purposes only.
4-
5-
Version 1.3 of the Chrome Root Program Policy was superseded by Version <a href=/Home/chromium-security/root-ca-policy/policy-archive/version-1-4/>1.4</a> on March 3, 2023.
3+
<p><strong><span style="color:#FF0000">IMPORTANT:</span></strong> This page is retained for historical purposes only.
4+
5+
Version 1.3 of the Chrome Root Program Policy was superseded by Version [1.4](./policy-version-1-4.md) on March 3, 2023.
66

77
For the latest version of the Chrome Root Program Policy, see <a href="https://g.co/chrome/root-policy">https://g.co/chrome/root-policy</a>.</p>
88

@@ -11,11 +11,11 @@ Google Chrome relies on Certification Authority systems (herein referred to as
1111

1212
When making HTTPS connections, Chrome refers to a list of root certificates from CAs that have demonstrated why continued trust in them is justified. This list is known as a “Root Store.” CA certificates included in the [Chrome Root Store](https://g.co/chrome/root-store) are selected on the basis of publicly available and verified information, such as that within the Common CA Database ([CCADB](https://ccadb.org/)), and ongoing reviews by the Chrome Root Program. CCADB is a datastore run by Mozilla and used by various operating systems, browser vendors, and CA owners to share and disclose information regarding the ownership, historical operation, and audit history of CAs and corresponding certificates and key material.
1313

14-
Historically, Chrome has integrated with the Root Store provided by the platform on which it is running. In Chrome 105, Chrome began a platform-by-platform transition from relying on the host operating system’s Root Store to its own on Windows, macOS, ChromeOS, Linux, and Android. This change makes Chrome more secure and promotes consistent user and developer experiences across platforms. Apple policies prevent the Chrome Root Store and corresponding Chrome Certificate Verifier from being used on Chrome for iOS.
14+
Historically, Chrome has integrated with the Root Store provided by the platform on which it is running. In Chrome 105, Chrome began a platform-by-platform transition from relying on the host operating system’s Root Store to its own on Windows, macOS, ChromeOS, Linux, and Android. This change makes Chrome more secure and promotes consistent user and developer experiences across platforms. Apple policies prevent the Chrome Root Store and corresponding Chrome Certificate Verifier from being used on Chrome for iOS.
1515

16-
The Chrome Root Program policy below establishes the minimum requirements for CA certificates to be included in a default installation of Chrome. Learn more about priorities and initiatives that may influence future versions of this policy [here](/Home/chromium-security/root-ca-policy/moving-forward-together/).
16+
The Chrome Root Program policy below establishes the minimum requirements for CA certificates to be included in a default installation of Chrome. Learn more about priorities and initiatives that may influence future versions of this policy [here](../moving-forward-together.md).
1717

18-
CA owners that satisfy the requirements defined in the policy below may apply for certificate inclusion in the Chrome Root Store using [these](/Home/chromium-security/root-ca-policy/apply-for-inclusion/) instructions.
18+
CA owners that satisfy the requirements defined in the policy below may apply for certificate inclusion in the Chrome Root Store using [these](../apply-for-inclusion.md) instructions.
1919

2020
### Additional Information
2121
If you’re a Chrome user experiencing a certificate error and need help, please see [this support article](https://support.google.com/chrome/answer/6098869?hl=en).
@@ -26,7 +26,7 @@ If you're responsible for a CA that only issues certificates to your enterprise
2626

2727
Though uncommon, websites can also use certificates to identify clients (e.g., users) connecting to them. Besides ensuring it is well-formed, Chrome passes this type of certificate to the server, which then evaluates and enforces its chosen policy. The policies on this page do not apply to client authentication certificates.
2828

29-
## Change History
29+
## Change History
3030

3131
<style type="text/css">.tg {border-collapse:collapse;border-spacing:0;}
3232
.tg td{border-color:black;border-style:solid;border-width:1px;overflow:hidden;padding:10px 5px;word-break:normal;}
@@ -63,7 +63,7 @@ Though uncommon, websites can also use certificates to identify clients (e.g., u
6363
<tr>
6464
<td class="tg-center">1.2</td>
6565
<td class="tg-center">2022-09-01</td>
66-
<td class="tg-left">Updated to reflect the launch of the Chrome Root Program. <br><br>Updates include, but are not limited to:
66+
<td class="tg-left">Updated to reflect the launch of the Chrome Root Program. <br><br>Updates include, but are not limited to:
6767
<li>removal of pre-launch discussion</li>
6868
<li>clarifications resulting from the June 2022 Chrome CCADB survey</li>
6969
<li>minor reorganization of normative and non-normative requirements</li>
@@ -78,7 +78,7 @@ Though uncommon, websites can also use certificates to identify clients (e.g., u
7878
</table>
7979

8080

81-
## Minimum Requirements for CAs
81+
## Minimum Requirements for CAs
8282

8383
This policy considers a CA owner to be an organization or legal entity that is represented in the subject DN of a CA certificate that is in possession or control of the corresponding private key capable of issuing new certificates. CA owners with certificates included in the Chrome Root Store must satisfy the requirements defined in this policy, including taking responsibility for ensuring the continued compliance of all corresponding subordinate CAs and delegated third parties participating in the Public Key Infrastructure (PKI).
8484

@@ -106,20 +106,20 @@ To qualify as a dedicated TLS PKI hierarchy under this policy:
106106

107107
1. All corresponding subordinate CA certificates operated beneath a root CA must:
108108
- <u>include</u> the extendedKeyUsage extension and <u>only</u> assert an extendedKeyUsage purpose of either:
109-
1. id-kp-serverAuth, or
109+
1. id-kp-serverAuth, or
110110
2. id-kp-serverAuth and id-kp-clientAuth
111111
- not contain a public key corresponding to any other unexpired or non-revoked certificate that asserts different extendedKeyUsage values.
112112
<br><br>
113113
2. All corresponding subscriber certificates must:
114114
- <u>include</u> the extendedKeyUsage extension and <u>only</u> assert an extendedKeyUsage purpose of either:
115-
1. id-kp-serverAuth, or
115+
1. id-kp-serverAuth, or
116116
2. id-kp-serverAuth and id-kp-clientAuth
117117

118118
It is expected that a future version of this policy will identify a phase-out plan for existing root CA certificates included in the Chrome Root Store that do not satisfy the requirements above to align all included CAs on these principles.
119119

120120
### 5. Audits
121121

122-
Both applicant CAs and those with certificates already included in the Chrome Root Store, along with all corresponding subordinate CAs, must be audited in accordance with the table below.
122+
Both applicant CAs and those with certificates already included in the Chrome Root Store, along with all corresponding subordinate CAs, must be audited in accordance with the table below.
123123

124124
<style type="text/css">
125125
.tg {border-collapse:collapse;border-spacing:0;}
@@ -185,7 +185,7 @@ CAs must retain an unbroken, contiguous audit coverage.
185185
Recurring complete (i.e., “full”, “full system” or “full re-assessment”) annual audits must begin once a CA’s key material has been generated and must continue until the corresponding root CA’s key material has been destroyed or is no longer included in the Chrome Root Store.
186186

187187
#### Ad-Hoc Audits
188-
Root CA certificate key material generation must be observed and audited by a Qualified Auditor who is unaffiliated with the CA owner, as described and required by Section 6.1.1.1 of the Baseline Requirements.
188+
Root CA certificate key material generation must be observed and audited by a Qualified Auditor who is unaffiliated with the CA owner, as described and required by Section 6.1.1.1 of the Baseline Requirements.
189189

190190
When deemed necessary, the Chrome Root Program may require CAs undergo additional ad-hoc audits, including, but not limited to, instances of CA private key destruction or verification of incident remediation.
191191

@@ -210,10 +210,10 @@ Any suspected or actual incident must be reported and publicly disclosed at the
210210

211211
When evaluating an incident response, Chrome’s primary concern is ensuring that browsers, other CA owners, users, and website developers have the necessary information to identify improvements, and that the CA owner is responsive to addressing identified issues.
212212

213-
Factors that are significant to Chrome when evaluating incidents include (but are not limited to):
214-
- a demonstration of understanding of the root causes of an incident,
215-
- a substantive commitment and timeline to changes that clearly and persuasively address the root cause,
216-
- past history by the CA owner in its incident handling and its follow through on commitments, and,
213+
Factors that are significant to Chrome when evaluating incidents include (but are not limited to):
214+
- a demonstration of understanding of the root causes of an incident,
215+
- a substantive commitment and timeline to changes that clearly and persuasively address the root cause,
216+
- past history by the CA owner in its incident handling and its follow through on commitments, and,
217217
- the severity of the security impact of the incident.
218218

219219
In general, a single incident considered alone is unlikely to result in removal of a CA certificate from the Chrome Root Store.

0 commit comments

Comments
 (0)