You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/index.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ The Chrome Root Program Policy below establishes the minimum requirements for CA
55
55
56
56
### Apply for Inclusion
57
57
58
-
CA Owners that satisfy the requirements defined in the policy below may apply for self-signed root CA certificate inclusion in the Chrome Root Store using [these](apply-for-inclusion) instructions.
58
+
CA Owners that satisfy the requirements defined in the policy below may apply for self-signed root CA certificate inclusion in the Chrome Root Store using [these](apply-for-inclusion.md) instructions.
59
59
60
60
### Chrome's Ongoing Commitment to Transport Security
61
61
@@ -72,7 +72,7 @@ Chrome maintains a variety of mechanisms to protect its users from certificates
72
72
73
73
The "Moving Forward, Together" initiative envisions a future Web PKI that includes modern, reliable, highly agile, purpose-driven PKIs with an emphasis on automation, simplicity, and security.
74
74
75
-
Learn more about priorities and initiatives that may influence future versions of this policy [here](moving-forward-together). Please note "Moving Forward, Together" is future looking and does not describe normative requirements.
75
+
Learn more about priorities and initiatives that may influence future versions of this policy [here](moving-forward-together.md). Please note "Moving Forward, Together" is future looking and does not describe normative requirements.
Copy file name to clipboardexpand all lines: content/policy-archive/policy-version-1-0.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
-
## Archive Notice
1
+
## Archive Notice
2
2
3
3
<p><strong><spanstyle="color:#FF0000">IMPORTANT:</span></strong> This page is
4
-
retained for historical purposes only.
5
-
6
-
Version 1.0 of the Chrome Root Program Policy was superseded by Version <a href=/Home/chromium-security/root-ca-policy/policy-archive/version-1-1/>1.1</a> on June 1, 2022.
7
-
4
+
retained for historical purposes only.
5
+
6
+
Version 1.0 of the Chrome Root Program Policy was superseded by Version [1.1](./policy-version-1-1.md) on June 1, 2022.
7
+
8
8
For the latest version of the Chrome Root Program Policy, see <ahref="https://g.co/chrome/root-policy">https://g.co/chrome/root-policy</a>.</p>
Copy file name to clipboardexpand all lines: content/policy-archive/policy-version-1-3.md
+18-18
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
-
## Archive Notice
1
+
## Archive Notice
2
2
3
-
<p><strong><spanstyle="color:#FF0000">IMPORTANT:</span></strong> This page is retained for historical purposes only.
4
-
5
-
Version 1.3 of the Chrome Root Program Policy was superseded by Version <a href=/Home/chromium-security/root-ca-policy/policy-archive/version-1-4/>1.4</a> on March 3, 2023.
3
+
<p><strong><spanstyle="color:#FF0000">IMPORTANT:</span></strong> This page is retained for historical purposes only.
4
+
5
+
Version 1.3 of the Chrome Root Program Policy was superseded by Version [1.4](./policy-version-1-4.md) on March 3, 2023.
6
6
7
7
For the latest version of the Chrome Root Program Policy, see <ahref="https://g.co/chrome/root-policy">https://g.co/chrome/root-policy</a>.</p>
8
8
@@ -11,11 +11,11 @@ Google Chrome relies on Certification Authority systems (herein referred to as
11
11
12
12
When making HTTPS connections, Chrome refers to a list of root certificates from CAs that have demonstrated why continued trust in them is justified. This list is known as a “Root Store.” CA certificates included in the [Chrome Root Store](https://g.co/chrome/root-store) are selected on the basis of publicly available and verified information, such as that within the Common CA Database ([CCADB](https://ccadb.org/)), and ongoing reviews by the Chrome Root Program. CCADB is a datastore run by Mozilla and used by various operating systems, browser vendors, and CA owners to share and disclose information regarding the ownership, historical operation, and audit history of CAs and corresponding certificates and key material.
13
13
14
-
Historically, Chrome has integrated with the Root Store provided by the platform on which it is running. In Chrome 105, Chrome began a platform-by-platform transition from relying on the host operating system’s Root Store to its own on Windows, macOS, ChromeOS, Linux, and Android. This change makes Chrome more secure and promotes consistent user and developer experiences across platforms. Apple policies prevent the Chrome Root Store and corresponding Chrome Certificate Verifier from being used on Chrome for iOS.
14
+
Historically, Chrome has integrated with the Root Store provided by the platform on which it is running. In Chrome 105, Chrome began a platform-by-platform transition from relying on the host operating system’s Root Store to its own on Windows, macOS, ChromeOS, Linux, and Android. This change makes Chrome more secure and promotes consistent user and developer experiences across platforms. Apple policies prevent the Chrome Root Store and corresponding Chrome Certificate Verifier from being used on Chrome for iOS.
15
15
16
-
The Chrome Root Program policy below establishes the minimum requirements for CA certificates to be included in a default installation of Chrome. Learn more about priorities and initiatives that may influence future versions of this policy [here](/Home/chromium-security/root-ca-policy/moving-forward-together/).
16
+
The Chrome Root Program policy below establishes the minimum requirements for CA certificates to be included in a default installation of Chrome. Learn more about priorities and initiatives that may influence future versions of this policy [here](../moving-forward-together.md).
17
17
18
-
CA owners that satisfy the requirements defined in the policy below may apply for certificate inclusion in the Chrome Root Store using [these](/Home/chromium-security/root-ca-policy/apply-for-inclusion/) instructions.
18
+
CA owners that satisfy the requirements defined in the policy below may apply for certificate inclusion in the Chrome Root Store using [these](../apply-for-inclusion.md) instructions.
19
19
20
20
### Additional Information
21
21
If you’re a Chrome user experiencing a certificate error and need help, please see [this support article](https://support.google.com/chrome/answer/6098869?hl=en).
@@ -26,7 +26,7 @@ If you're responsible for a CA that only issues certificates to your enterprise
26
26
27
27
Though uncommon, websites can also use certificates to identify clients (e.g., users) connecting to them. Besides ensuring it is well-formed, Chrome passes this type of certificate to the server, which then evaluates and enforces its chosen policy. The policies on this page do not apply to client authentication certificates.
@@ -63,7 +63,7 @@ Though uncommon, websites can also use certificates to identify clients (e.g., u
63
63
<tr>
64
64
<td class="tg-center">1.2</td>
65
65
<td class="tg-center">2022-09-01</td>
66
-
<td class="tg-left">Updated to reflect the launch of the Chrome Root Program. <br><br>Updates include, but are not limited to:
66
+
<td class="tg-left">Updated to reflect the launch of the Chrome Root Program. <br><br>Updates include, but are not limited to:
67
67
<li>removal of pre-launch discussion</li>
68
68
<li>clarifications resulting from the June 2022 Chrome CCADB survey</li>
69
69
<li>minor reorganization of normative and non-normative requirements</li>
@@ -78,7 +78,7 @@ Though uncommon, websites can also use certificates to identify clients (e.g., u
78
78
</table>
79
79
80
80
81
-
## Minimum Requirements for CAs
81
+
## Minimum Requirements for CAs
82
82
83
83
This policy considers a CA owner to be an organization or legal entity that is represented in the subject DN of a CA certificate that is in possession or control of the corresponding private key capable of issuing new certificates. CA owners with certificates included in the Chrome Root Store must satisfy the requirements defined in this policy, including taking responsibility for ensuring the continued compliance of all corresponding subordinate CAs and delegated third parties participating in the Public Key Infrastructure (PKI).
84
84
@@ -106,20 +106,20 @@ To qualify as a dedicated TLS PKI hierarchy under this policy:
106
106
107
107
1. All corresponding subordinate CA certificates operated beneath a root CA must:
108
108
- <u>include</u> the extendedKeyUsage extension and <u>only</u> assert an extendedKeyUsage purpose of either:
109
-
1. id-kp-serverAuth, or
109
+
1. id-kp-serverAuth, or
110
110
2. id-kp-serverAuth and id-kp-clientAuth
111
111
- not contain a public key corresponding to any other unexpired or non-revoked certificate that asserts different extendedKeyUsage values.
112
112
<br><br>
113
113
2. All corresponding subscriber certificates must:
114
114
- <u>include</u> the extendedKeyUsage extension and <u>only</u> assert an extendedKeyUsage purpose of either:
115
-
1. id-kp-serverAuth, or
115
+
1. id-kp-serverAuth, or
116
116
2. id-kp-serverAuth and id-kp-clientAuth
117
117
118
118
It is expected that a future version of this policy will identify a phase-out plan for existing root CA certificates included in the Chrome Root Store that do not satisfy the requirements above to align all included CAs on these principles.
119
119
120
120
### 5. Audits
121
121
122
-
Both applicant CAs and those with certificates already included in the Chrome Root Store, along with all corresponding subordinate CAs, must be audited in accordance with the table below.
122
+
Both applicant CAs and those with certificates already included in the Chrome Root Store, along with all corresponding subordinate CAs, must be audited in accordance with the table below.
123
123
124
124
<styletype="text/css">
125
125
.tg {border-collapse:collapse;border-spacing:0;}
@@ -185,7 +185,7 @@ CAs must retain an unbroken, contiguous audit coverage.
185
185
Recurring complete (i.e., “full”, “full system” or “full re-assessment”) annual audits must begin once a CA’s key material has been generated and must continue until the corresponding root CA’s key material has been destroyed or is no longer included in the Chrome Root Store.
186
186
187
187
#### Ad-Hoc Audits
188
-
Root CA certificate key material generation must be observed and audited by a Qualified Auditor who is unaffiliated with the CA owner, as described and required by Section 6.1.1.1 of the Baseline Requirements.
188
+
Root CA certificate key material generation must be observed and audited by a Qualified Auditor who is unaffiliated with the CA owner, as described and required by Section 6.1.1.1 of the Baseline Requirements.
189
189
190
190
When deemed necessary, the Chrome Root Program may require CAs undergo additional ad-hoc audits, including, but not limited to, instances of CA private key destruction or verification of incident remediation.
191
191
@@ -210,10 +210,10 @@ Any suspected or actual incident must be reported and publicly disclosed at the
210
210
211
211
When evaluating an incident response, Chrome’s primary concern is ensuring that browsers, other CA owners, users, and website developers have the necessary information to identify improvements, and that the CA owner is responsive to addressing identified issues.
212
212
213
-
Factors that are significant to Chrome when evaluating incidents include (but are not limited to):
214
-
- a demonstration of understanding of the root causes of an incident,
215
-
- a substantive commitment and timeline to changes that clearly and persuasively address the root cause,
216
-
- past history by the CA owner in its incident handling and its follow through on commitments, and,
213
+
Factors that are significant to Chrome when evaluating incidents include (but are not limited to):
214
+
- a demonstration of understanding of the root causes of an incident,
215
+
- a substantive commitment and timeline to changes that clearly and persuasively address the root cause,
216
+
- past history by the CA owner in its incident handling and its follow through on commitments, and,
217
217
- the severity of the security impact of the incident.
218
218
219
219
In general, a single incident considered alone is unlikely to result in removal of a CA certificate from the Chrome Root Store.
0 commit comments