Due to recent entrust cert authority issues, certificates issued by entrust are now signed by ssl.com root certificates. This new root is not especially old (valid since 2022) and we've found a few clients with security appliances (and java keystores and the like) that don't have it in their trusted roots stores.
Aside from contacting a trusted root authority directly - is there any digest and/or publicly available source of truth for updates to common root stores (such as windows trusted roots)? CA Browser (chrome etc) links announcing new trusted root certs?
We'd like to be able to point inquiring security teams from clients to public documentation and say "this root has been publicly distributed and or allowed since x date" whenever new root certs may not be found in whatever keystore they are using.
I understand that a public document on a site is not a source of truth for trust - but its gotta be something that the layman can understand, so that our CS teams can talk to another companies security team that might not be masters of the TLS domain...
Any thoughts on something more generic that could be used to tell a client why a root should be trusted?
The salesforce link to firefox's inclusion of roots into its browser store is closest to getting there as it lists firefox version support for each root.
SSL.com USA, Global https://www.ssl.com/ SSL.com TLS RSA Root CA 2022 Firefox 117 2046 Aug 19
References
- https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1277336
- https://wiki.mozilla.org/index.php?title=CA/IncludedCertificates&redirect=no
- https://ccadb.my.salesforce-sites.com/mozilla/CACertificatesInFirefoxReport
- https://learn.microsoft.com/en-us/security/trusted-root/2023/nov2023
- https://www.ccadb.org/resources
<update>
Trusted root program can be searched relatively easily by ca name - found the cert in question there as well (added reference link) https://learn.microsoft.com/en-us/security/trusted-root/2023/nov2023