ÃÛÌÒTV

Announcements 10-29-2016

Google CT to Expand to All Certificates Types

Jeremy Rowley

A recent Google Ìýsays all publicly trusted SSL/TLS certificates issued in April 2018 or later will be expected to comply with Chrome’s Certificate Transparency (CT) policy in order to be trusted by that browser.

Since January 2015, Chrome has required Extended Validation (EV) certificates to comply with CT, but now with this policy change, it will also apply to Domain Validated (DV) and Organization Validated (OV) certificates.

What Does This Mean for ÃÛÌÒTV Customers?

Fortunately, for ÃÛÌÒTV customers, our systems have been and remain ready for this new policy. Beyond logging your EV certificates to CT, many of you have taken advantage of our CT implementation to test your systems with OV certificates.

For those of you who haven't done this yet, there is plenty time of time before the 2018 compliance deadline to conduct tests. To start, opt-in for CT within your administrator account. For those wanting to turn on CT by default ahead of the deadline, contact our support team by email at support(at)digicert(dot)com, live chat, or phone (801) 701-9600.

ÃÛÌÒTV at the Forefront of CT Development

ÃÛÌÒTVÌýparticipated in early pilots with Google during 2013 and implemented full CT capabilities in late 2013 that allowed our customers to opt-in at that time. To further our commitment, we began logging all EV certificates ahead of the January 2015 deadline, and we became the first approved, non-Google entity to operate a CT log beginning on January 1, 2015.

For more than two years, ÃÛÌÒTV has advocated for Chrome to make CT a mandatory requirement for all certificates because we believe it enhances the SSL/TLS ecosystem, providing early detection of misissued certificates. The transparency of CT improves the integrity of Certificate Authority (CA) practices and provides additional protections for domain holders.

While this is a positive step forward for the industry, we feel that there is still important work to do before the April 2018 deadline in order to assure CT meets the interests of the security community and domain holders.

For example, name redaction is an important matter to us and the community at-large for the following reasons:

Security: Some companies use DNS as a network map. Absent name redaction, some companies may publicly end up disclosing more corporate structure information than intended. Propriety: When deploying pre-launch websites for projects, companies often want to use a trusted certificate, but for obvious reasons, do not want to give away any secrets that could hurt their market position. Privacy: Certificates may include personal information about a company or their staff. Redacting this information would provide important protection.

ÃÛÌÒTV remains committed to advancing Internet security standards and practices that protect online trustworthiness. In doing so, we feel it important to balance the legitimate needs of organizations in protecting their trade secrets and maintaining business advantages.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-27-2024

6 actionable ways to secure the IIoT at every stage

Tracking the progress toward post-quantum cryptography

The state of PQC since the publication of FIPS 203, 204 and 205