November 1, 2016 By Larry Loeb 2 min read

First organized in 2005, The CA/Browser Forum is a voluntary group of certification authorities (CAs), vendors of internet browser software and suppliers of other applications that use X.509 v.3 digital certificates for SSL/TLS and code signing. In other words, it’s an industry group focused on certificates.

The Forum was a logical place for Ryan Sleevi of Google to announce that as of October 2017, the Chrome browser would implement Certificate Transparency (CT) as a mandatory feature.

What Is Certificate Transparency?

CT is an open-source framework designed by Google. It is used for monitoring and auditing the domain certificates sites use to establish authenticity with browsers. First proposed in 2013, Certificate Transparency is now an Internet Engineering Task Force (IETF) open standard, Threatpost reported.

Google thinks the use of CT will aid the trusted online community. “The use of Certificate Transparency has profoundly altered how browsers, site owners and relying parties are able to detect and respond to misissuance and, importantly, gives new tools to mitigate the damage caused when a CA no longer complies with community expectations and browser programs,” Sleevi said on the forum.

Push Toward Mass Adoption

At its heart, CT is a way to reign in CAs that go off the tracks. This happens frequently: Within the past year, Symantec publicly issued certificates that were supposedly for internal use only and a major Chinese CA was also caught issuing untrustworthy certificates to unknown sites. Malware actors could use these certificates in inappropriate and untrustworthy ways.

Google knows it can’t push the entire population toward standardization and mass adoption of CT all by itself, but it can impose the technology on Chrome users. Since Chrome has an overall market share near 60 percent, just doing that will have a great effect.

Google invited security researchers to come forward with any issues related to CT in the next three months to allow time for solutions to be implemented.

Resistance to CT

There may be deeper problems regarding CT. Bruce Morton, director of certificate services with EnTrust, told Threatpost that some have expressed hesitation about registering all external and internal domain names in one publicly accessible repository. He argued that many companies would rather keep this information private.

It remains to be seen if Google can get the industry to rally around CT as a standard way of doing business.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today