Chrome Will Soon Have Its Own Dedicated Certificate Root Store (zdnet.com) 56
Google has announced plans to run its own certificate root program/store for Chrome, in a major architectural shift for the company's web browser program. From a report: A "root program" or a "root store" is a list of root certificates that operating systems and applications use to verify the identity of a software program during its installation routine. Browsers like Chrome use root stores to check the validity of an HTTPS connection. They do this by looking at the website's TLS certificate and checking if the root certificate that was used to generate the TLS cert is included in the local root program/store. Since its launch in late 2009, Chrome was configured to use the "root store" of the underlying platform. For example, Chrome on Windows checked a site's TLS certificate against the Microsoft Trusted Root Program, the root store that ships with Windows; Chrome on macOS relied on the Apple Root Certificate Program; and so on. But in a wiki page, shared with ZDNet by one of our readers, Google announced plans to create its own root store, named the Chrome Root Program, that will ship with all versions of Chrome, on all platforms, except iOS.
Does this mean (Score:5, Interesting)
Does this mean that presumably we could have a secure version of Chrome for older platforms like Windows XP? I know one of the final things that drove me away from using old Windows XP machines one old hardware I had lying around was the fact that it just couldn't be made secure anymore. Theoretically, if you don't really depend on the OS for anything involving security you could have a browser for older platforms that allowed people to use the web safely while saving old machines from the landfill.
Re:Does this mean (Score:4, Insightful)
Install Linux?
Such a weird comment. It's 2020 and you'd rather install Windows XP on an old PC than a modern free OS.
Re: (Score:3)
There is still a lot of software that runs on XP but not on Linux.
Re: (Score:2)
In that case run XP inside a VM from Linux. Keep snapshots in case anything bad happens.
Re: (Score:2)
I thought about doing that. Unfortunately, I think the VM overhead will force me to just run 10 directly.
Re: (Score:2)
Re: (Score:2)
1%-2% overhead (actually -5%) (Score:2)
If you turn on virtualization support in your BIOS, the virtualization overhead is may 1%-2%. If you don't turn that on, qemu has to emulate the CPU. If you turn it in, most instructions run directly on the physical CPU.
What will likely affect performance more is that modem Linux is better at disk and memory access than XP is, so you'll probably see a slight speed up overall.
Re: (Score:2)
Windows 10 can be debloated and keep compatibility (Score:3)
Then, with appropriate unofficial patches
Re: (Score:2)
Does that include running on Wine? (Score:2)
Next, try to run your app in Wine. Just install or copy it as normal and use winecfy to set the Windows version to XP. If it fails, refer to the SysInternals dump to gradually add native DLLs based on what it touches and add chunks of the registry as necessary. Unless the software relies on some crazy system services, it should work.
Ol
Re: (Score:3)
That doesn't seem like a good reason to make XP your daily driver OS. Sure, keep a XP box around to run that software, or run it in a VM. There's little reason to actually browse the internet from a Windows XP machine anymore.
Re: (Score:3)
The problem is that some old users have very old hardwares that don't have newer drivers and softwares. :(
No. (Score:2)
> Theoretically, if you don't really depend on the OS for anything involving security
Your operating system can completely replace the installed copy of Chrome with a trojaned version. Every time Chrome makes a network connection - well, it doesn't make a network connection, it asks the OS to make a network connection. The OS handles all network connections. When Chrome wants to download a file, it asks the OS to save the file. Chrome wants to read a file, it asks the OS to read the file for it. Everyt
Re: (Score:3)
If your OS isn't safe, absolutely no programs running on that OS are safe.
No general purpose OS is "safe".
Re: (Score:2)
As most commonly used by consumers, indeed none are secure, for any reasonably usable definition of secure. On the other hand, some are absolute shit shows, some are not. XP is a shit show.
Linux can be run in configurations that have useful security guarantees, where you can prove useful security properties. (To have provable security properties, the machine must be using mandatory access control (SELinux).
Re: (Score:2)
Linux can be run in configurations that have useful security guarantees, where you can prove useful security properties. (To have provable security properties, the machine must be using mandatory access control (SELinux).
No it can't. This is an illusion referenced to an interface rather than an underlying reality.
Re: (Score:2)
Ya know, the way to be smart is to *learn* from experts.
The way to remain forever ignorant is to try to pretend to be smart by just saying "no" when somebody is teaching you something. You may feel like you look smart; in reality you look like someone who refuses to learn.
Re: (Score:3)
Chrome for older platforms like Windows XP?
Chrome isn't supported for Windows XP. If you have a Windows XP machine on the internet then the SSL certificate store is the least of your concerns.
Re: (Score:3)
Does this mean that presumably we could have a secure version of Chrome for older platforms like Windows XP?
None of the third party browsers use the Windows TLS stack. Browsers are able to access operating systems certificate database however ALL the crypto is handled by the browser.
Theoretically, if you don't really depend on the OS for anything involving security you could have a browser for older platforms that allowed people to use the web safely while saving old machines from the landfill.
While there are theoretical risks user behavior is way more important than OS selection especially for typical user sitting behind a stealth firewall. Well over 90% of system compromises are executed via social engineering not exploitation of vulnerabilities.
Re: (Score:3)
> Well over 90% of system compromises are executed via social engineering not exploitation of vulnerabilities.
In my experience over the last 20 years, most are both, but mostly exploiting software vulnerabilities. User gets a spreadsheet in an email from a known contact. User opens spreadsheet. Vulnerability in Excel allows the document to install malware on the system. Reading a document shouldn't allow a bad guy to take over the *system*.
Reading office documents is what office computers are *for*. A c
Re: Does this mean (Score:3)
Coming soon, chrome only certificates (Score:3, Insightful)
Re: Coming soon, chrome only certificates (Score:2)
so no IPMI's, in house ldaps, routers, swtichtes? (Score:3)
so no IPMI's, in house ldaps, routers, switches? unless you replace them at EOL to get new ca's?
Re: (Score:2)
I presume it'd be similar to firefox: you'll have to manage the browsers certificate store as well as the OS.
Of course, at this point only Edge would use the OS store and all the other browsers don't use it.
Re: (Score:2)
Pay for the Chrome cerificate or Chrome will block your site as insecure
It's amazing that you people continue to come up with these despite them basically never coming true. Leave the predictions to Nostradamus and put more effort into stopping the government satellite signals from affecting your brain.
Re: (Score:2)
Mozilla has been doing this from day 1. I don't think they charge anyone for the service even though they do a huge amount of work to verify the chain of trust, but I could be wrong.
Anyway if you don't play by Mozilla's rules then all Firefox users will get warnings on your sites.
Re: Coming soon, chrome only certificates (Score:3)
And Ubuntu (and probably most Deb-based Linuxes) just uses Mozilla's root certs.
Re: (Score:2)
Don't forget that we need a Groot Store, for vegans.
Chrome copying Firefox? (Score:5, Informative)
Re: (Score:2)
Seems like it, and Mozilla has done well out of that decision.
Mozilla is a major player in the certificate game. If you want to set up a root CA you have to play by Mozilla's rules. And they can act relatively quickly when a CA screws up, putting them ahead when it comes to security.
Google probably wants the same level of control.
Sure (Score:5, Insightful)
All we need to do is trust the company that issues the certificate.
Oh.
Maybe not.
Trusting google... (Score:2)
Why not iOS? (Score:2)
Just curious, and the article doesn't say.
Re: (Score:2)
YMMV as to whether this is a good thing in general and
Re: (Score:1)
Re: (Score:3)
Because Chrome (and every other third party browser on iOS) is just a wrapper around Safari, so it can only do what Safari does.
Sure... Let Google have even more say (Score:2)
Good now we will have (Score:2)
Will it lower adoption in corporate environments? (Score:2)
You'd think this would be met with a groan by corporate PC managers who manage CAs and root trust via group policy but use Chrome over IE/Edge on the desktop. I know Chrome has some policy templates, but this seems like just more spaghetti in the spaghetti mess that is corporate GPO.
Re: (Score:2)
Re: (Score:3)
Have you ever looked at the ADMX templates for Chrome? I haven't, but I know they exist. I would be really surprised if certificate installation wasn't part of them once they rolled this out. There's too many self-managed CAs and the need for specific self-signed certificate trusts for Chrome to just go to an unmanageable internal certificate trust model.
Re: (Score:3)
Oh I use them. They're actually pretty neat, for the most part. Managing complex certificate chains through ADMX though is something I don't relish doing as ADMX is really not suited to the task.
I'm really hoping that they implement this whole thing by using an internal store in combination with the system one.
Re: (Score:3)
It would kind of surprise me if there wasn't an option to trust the local cert store, I'd imagine there's a lot of use cases where they're needed beyond just the browser, and parallel installations would be a nightmare to keep track of.
CA store should be global (Score:4, Insightful)
Re: CA store should be global (Score:2)
That's exactly what DANE solves.
Re: (Score:3)
Re: CA store should be global (Score:2)
All about control over your software. I love Firefox because it's easy to distrust many entities, while also allowing those you prefer, specifically for the personal use like you mentioned.
Tweaking the OS is often more difficult, and you get stuck with crappy root CAs like various countries and legacy companies that cannot be trusted.
ICANN has it's own issues, but the root cert ceremony seems more legit than hundreds of self-signed certs implicitly trusted.
If you own a domain, you can self-sign for no extra
This is dumb (Score:2)