Security

Google cuts ties with Entrust in Chrome over trust issues

Move comes weeks after Mozilla blasted certificate authority for failings


Google is severing its trust in Entrust after what it describes as a protracted period of failures around compliance and general improvements.

Entrust is one of the many certificate authorities (CA) used by Chrome to verify that the websites end users visit are trustworthy. From November 1 in Chrome 127, which recently entered beta, TLS server authentication certificates validating to Entrust or AffirmTrust roots won't be trusted by default.

Crucially, this applies to certificates whose earliest Signed Certificate Timestamp is dated after October 31, 2024. So current certs will continue to work, but new ones after October 31 won't.

Google pointed to a series of incident reports over the past few years concerning Entrust, saying they "highlighted a pattern of concerning behaviors" that have ultimately seen the security company fall down in Google's estimations.

The incidents have "eroded confidence in [Entrust's] competence, reliability, and integrity as a publicly trusted CA owner," Google stated in a blog.

It follows a May publication by Mozilla, which compiled a sprawling list of Entrust's certificate issues between March and May this year. In response, and after an initial reply that was greeted with harsh feedback from the Mozilla community, Entrust acknowledged its procedural failures, Mozilla noted, and said it was treating the feedback as a learning opportunity. 

It now seems Google hasn't been as accepting of Entrust's apologetic response.

Per the November cutoff, Google is providing a long grace period it said will hopefully minimize any potential disruption. Certificates issued before October 31 will remain trusted as long as they validate to the roots specified in Google's blog.

Google users can manually trust these roots after the change to maintain their current functionality. Enterprises will be able to override the constraints described here starting in Chrome 127, should they want to use Entrust's certificates in their internal network too.

"Certification authorities serve a privileged and trusted role on the internet that underpin encrypted connections between browsers and websites," Google said. "With this tremendous responsibility comes an expectation of adhering to reasonable and consensus-driven security and compliance expectations, including those defined by the CA/Browser TLS Baseline Requirements.

"Over the past six years, we have observed a pattern of compliance failures, unmet improvement commitments, and the absence of tangible, measurable progress in response to publicly disclosed incident reports. When these factors are considered in aggregate and considered against the inherent risk each publicly trusted CA poses to the internet ecosystem, it is our opinion that Chrome's continued trust in Entrust is no longer justified."

The changes will be applied to Chrome users across all the major OSes except Chrome on iOS, which doesn't allow Chrome's own certificate verification from working on iPhones and iPads. MacOS is unaffected by this, though, and will block Entrust certs from November like everything else.

For owners of websites, this means they'll need to choose a new CA owner before the November cutoff – but ideally as soon as possible – to ensure visitors aren't met with Chrome's warning page designating the connection to the site as unsafe.

Tim Callan, chief experience officer at Sectigo, said in an email to The Reg that the news serves as a reminder to CAs that they must hold themselves to the standards the industry expects of them.

"CAs have to hold themselves to the highest of standards, not only for the sake of their business but for all the people and businesses that depend on them. With a shorter lifecycle timeline of 90 days looming, and the implications of Quantum Computing also on the horizon, things aren't getting any less complicated.

"It's more important than ever that CAs and CLM providers stay at the top of their game and fully comply with CA/Browser Forum rules and baseline requirements."

A spokeperson at Entrust sent a statement to The Register: "The decision by the Chrome Root Program comes as a disappointment to us as a long-term member of the CA/B Forum community. We are committed to the public TLS certificate business and are working on plans to provide continuity to our customers." ®

Editor's note: This article was revised to make clear that new certificates will be affected by this change.

Send us news
24 Comments

Google can totally explain why Chromium browsers quietly tell only its websites about your CPU, GPU usage

OK, now tell us why this isn't an EU DMA violation – asking for a friend in Brussels

Google festoons Chrome Enterprise browser with more controls

Because if there's one thing it really needed more of...

Risk of installing dodgy extensions from Chrome store way worse than Google's letting on, study suggests

All depends on how you count it – Chocolate Factory claims 1% fail rate

Infoseccers claim Squarespace migration linked to DNS hijackings at Web3 firms

Company keeps quiet amid high-profile compromises

Google reportedly in talks to buy infosec outfit Wiz for $23 billion

The security industry has never had a clear leader – could it be the Chocolate Factory?

Apple, Google, ease cross-cloud data transfers, perhaps with costly catch

The joy of cloudy interoperability may be dampened by differently-sized free storage tiers

Google begs court for relief from Epic Games' Play Store demands

$137M needed to overhaul Play Store too great to bear, Google argues. Oh, and user security is important, too

Microsoft forgets about SwiftKey's support site

Injecting Copilot branding will not make TLS certificates auto-renew

Google Translate now fluent in 110 additional languages from Abkhaz to Zulu

Ta shoh scansh mie, son ymmyd

RADIUS networking protocol blasted into submission through MD5-based flaw

If someone can do a little MITM'ing and hash cracking, they can log in with no valid password needed

Europol nukes nearly 600 IP addresses in Cobalt Strike crackdown

Private sector helped out with week-long operation – but didn't touch China

Cancer patient forced to make terrible decision after Qilin attack on London hospitals

Skin-sparing mastectomy and breast reconstruction scrapped as result of ransomware at supplier