Podcast
Root Causes 308: E-Tugra Root Deprecation


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
June 5, 2023
For the second time in under twelve months, a major browser is deprecating a CA's public trust. This time it's E-Tugra. Learn about the concerns raised about this CA, investigation of these concerns, and the ultimate deprecation decision.
Podcast Transcript
Lightly edited for flow and brevity.
Then the other thing that they usually have is market advantages just because they have feet on the ground in terms of connecting with customers. So it’s easier to do local events; it’s easier to do local marketing, use local media and things along those lines. So you see a lot of these in a lot of different countries and you can understand why that might be beneficial for the local populace to have something they can use that’s a local business and it’s easier to do business with. At the same time you can understand where you can carve out a business that way. I think e-Tugra is of that class. They are not particularly focused on another niche other than the fact that they are Turkish and they are really doing business in Turkey.
Second, are they responding to the community in a reasonable way? Are they responding quickly enough? Are they responding accurately and are they responding let’s say completely enough or expansively enough? There was a sub-dialogue about that because some people were finding fault with the responsiveness and the forthcoming nature of e-Tugra’s dialogue. Then the third thing that I kind of focused on was what was e-Tugra’s relationship with the CAs that they were cross-signing from – that they were sub-CAs of - and were those CAs in any way also part of this problem? And all three of those things I would say were pretty thoroughly examined over a long period of time. So the end of that occurred – and let me find the date on this – on the Google group, not on the actual Bugzilla bug around this but on the Google group as of June 2, 2023, a representative of the Google Chromium Root Store has said – I’m just gonna exert a little bit from this message – “After full consideration of the available information relating to the vulnerabilities disclosed in blah, blah, blah, including that of incident reports and other public responses we have decided that in order to appropriately protect and safeguard Chrome users, the following e-Tugra root CA certificates will be removed from the Chrome Root Store,” and it is two authentic e-Tugra roots that are there in the Chrome Root Store. So that’s important. Other root programs have not necessarily gotten to the point of including them in the first place but Google pulling them out essentially means those roots are not really gonna be usable and it means that e-Tugra can continue to be kind of a white label reseller like it is now but doesn’t have a reasonable prospect of being a full-fledged CA anytime in the foreseeable future.
So, let me ask you, Tim. I want to get, you know, let’s get to the root causes, right? So, you were saying cybersecurity issues. I don’t think that was your word but that was the way I heard it in my head. So, we’ve heard about distrust issues because of other things. I can’t recall a general lack of cybersecurity posture of a CA, you know, coming up first and foremost. Am I wrong in saying that?
This is also a little unusual, Jay. I hinted at this in the beginning in that this was a set of roots that hadn’t really been fully adopted by the community. Apart from test certs, there aren’t any leaf certs. There aren’t end user subscriber leaf certificates in production today for these roots because they were still in the process of getting included. They were in Chrome but they weren’t in Apple. I’m not sure what the status was of the other major programs, but they were not fully adopted yet and so because they are not fully adopted nobody is really gonna buy that, right? You are not gonna buy a cert, stick it on your website, and someone says it doesn’t work on the MacIntosh and if it doesn’t work on the Apple stack who really cares. You’d say, well, I care and I’m gonna wait. So, there aren’t end businesses or end subscribers that are affected by this. And this is another way that’s unusual. If they are going and blowing up somebody else’s CA then that Certificate Authority has subscribers and those people need to get new certs. And they are gonna have things that stop working one day if they don’t get the message and they don’t change them out and surely some of them don’t and find out when things stop working. This is different in that there are no subscribers affected because they kind of got it before it made it that far. In that sense I can’t think of another example of CA distrust happening before they were in the world of issuing leaf certificates.

