Certificate transparency and privately installed certs

1.5k Views Asked by At

Does anyone know whether the certificate transparency feature as promoted by Google can/will apply to private installed CAs?

It seems like Chrome is already enforcing CT in some situations, presumably by auditing public CA logs. For private CAs that do legitimate Man-in-the-middle, there obviously won't be public CA auditing information, and it would be good to know that Chrome won't balk at that.

4

There are 4 best solutions below

1
On BEST ANSWER

The CT enforcement policy applies only to public CAs, not self-signed or private CAs. The closest thing I could find confirming this was this tweet from Google's Ryan Sleevi.

Image of Ryan Sleevi's tweet

0
On

The official docs make it clear that Certificate Transparency only applies to CAs that are publicly-trusted - that is, CAs that are supported by your browser or device out of the box, without any additional configuration steps.

For CAs that have been manually installed, provided those certificates are not or have not been publicly-trusted, it‘s not necessary to enable support for Certificate Transparency. Further, Certificate Transparency Logs will not accept certificates from those CAs, thus it’s not possible to support CT.

Ref: https://chromium.googlesource.com/chromium/src/+/refs/heads/main/net/docs/certificate-transparency.md#Locally_trusted-CAs

0
On

Still an issue, private certs does have issues with CT, as I've explained here: Referrer policy hide the referrer of self-signed certificates

0
On

CT enforcement policy also seems to be applied to internal EV certificates.

Whereas in Internet Explorer the addressbar is green with EV company name, and in chrome it is only listed as "Secure | https".