Policy

Resources

Policy Archive

Moving Forward, Together

Last updated: 2026-02-05

For more than the last decade, community members have tirelessly worked together to make the Internet a safer place. However, there’s still more work to be done. While we don’t know exactly what the future looks like, we remain focused on promoting changes that increase speed, security, stability, and simplicity throughout the ecosystem.

With those goals in mind, the Chrome Root Program continues to explore introducing future requirements related to the following themes:

Understanding "Moving Forward, Together" initiatives

The initiatives described on this page are distinct from the requirements detailed in the Chrome Root Program Policy. These initiatives are proposals for exploration. They are not requirements.

Some proposals may change during our review process, after considering community feedback, or studying the ecosystem impacts and tradeoffs of adoption. Others may not be adopted at all.

As an example, community feedback shaped the adoption of a previous "Moving Forward, Together" initiative promoting Certification Authority (CA) agility. This proposal placed a limit on the duration of a root CA certificate’s inclusion in the Chrome Root Store (i.e., root "term-limit"). Based on feedback from the CA Owners included in the Chrome Root Store and as a result of studying data from publicly-available sources related to certificate ubiquity, we extended the duration of the initially proposed term-limit from 7 to 15 years and landed these changes in Version 1.5 of the Chrome Root Program Policy.

Why communicate these initiatives?

Our program prioritizes transparency and recognizes that significant change takes time, careful planning, and collaboration. Many initiatives in "Moving Forward, Together" represent significant shifts within the ecosystem, and we want to minimize adverse ecosystem impacts when appropriate and possible. By sharing our initiatives early, we aim to understand the challenges stakeholders may face, collaboratively develop solutions to meet stated goals, and ultimately amplify the positive impact of these changes while reducing the negative.

When might these initiatives take effect?

We understand the enthusiasm within the community regarding some of the proposals described on this page. However, we want to emphasize that there are currently no planned implementation timelines for these initiatives, unless explicitly stated below, in the Chrome Root Program Policy, or in CA/Browser Forum Server Certificate Working Group Ballots. Again, not all proposals and initiatives may be ultimately adopted by the Chrome Root Program Policy.

How might these initiatives take effect?

Some of the proposals described on this page might be achieved through collaborations within the CA/Browser Forum. In other cases, it might be most appropriate for corresponding changes to land only in the Chrome Root Program Policy, as not all CA Owners who adhere to the CA/Browser Forum TLS Baseline Requirements intend to serve Chrome’s focused PKI use case of server (i.e., website) authentication, or wish to be trusted by default in Chrome. Regardless of how these proposals might eventually be implemented, we are committed to collaborating with community members and deeply value their feedback.

What informs our approach?

To explore and understand the broader ecosystem impacts of these proposals, we:

This helps ensure our decisions are informed by real-world data, observed Chrome user behavior, expert research, and the many voices of the community.

Areas under exploration:

Experiment and evolve the ecosystem through Merkle Tree Certificates

Themes: (1) "Encouraging modern infrastructures and agility", (2) "Focusing on simplicity", and (3) "Preparing for a post-quantum world"

Understanding the Post-Quantum challenge: The rise of quantum computing poses two significant threats to HTTPS.

The first is the threat to traffic generated today. An adversary could store encrypted traffic now, wait for a cryptographically-relevant quantum computer ("CRQC") to become practical, and then use it to decrypt the traffic after the fact. This is commonly known as a "store-now-decrypt-later" attack. Chrome has mitigated this risk through the deployment of post-quantum key exchange.

The second threat is that future traffic is vulnerable to impersonation by a quantum computer. Once a CRQC exists, it could break the asymmetric cryptography used for authentication in HTTPS. To defend against impersonation from a CRQC, we need to migrate all of the asymmetric cryptography used for authentication to post-quantum variants. Unfortunately, post-quantum keys and signatures have a fundamental problem: their size. A single post-quantum signature can be over 20 times larger than the classical cryptography signatures commonly used today (e.g., ECDSA). Considering that secure connections in Chrome often rely on more than 5 signatures and 2 public keys, attempting to use post-quantum cryptography as a "drop-in" replacement within the existing ecosystem would drastically degrade internet performance. For this reason Chrome has no immediate plan to add traditional X.509 certificates containing post-quantum cryptography to the Chrome Root Store and will only do so as a last resort.

Instead, Chrome, in collaboration with other partners, is exploring a fundamental evolution of the ecosystem based on Merkle Tree Certificates (MTCs). MTCs replace the heavy, serialized chain of signatures found in traditional PKI with compact Merkle Tree proofs. In this model, a CA signs a single "Tree Head" representing potentially millions of certificates, and the "certificate" sent to the browser is merely a lightweight proof of inclusion in that tree.

Why it matters:

Modernizing issuing CA infrastructure

Themes: (1) "Encouraging modern infrastructures and agility" and (2) "Focusing on simplicity"

Understanding modern issuance practices: Today, the "intermediate" or "issuing" CAs that sit between the Root and the leaf certificate presented by a server are traditionally treated as static, long-lived infrastructure. Often valid for a decade or more, these intermediates can become single points of failure. If an intermediate CA is compromised or needs replacement due to an unforeseen circumstance, for example a cryptographic vulnerability, the "blast radius" can be massive, potentially requiring the revocation of tens or hundreds of millions of certificates.

To address this, the Chrome Root Program is exploring policies that encourage a shift toward more ephemeral and dynamic CA infrastructure. This includes:

Why it matters:

Further sunsetting legacy practices

Themes: (1) "Focusing on simplicity", (2) "Encouraging modern infrastructures and agility", and (3) "Increasing accountability and ecosystem integrity"

Understanding legacy practices: As the ecosystem evolves, standards bodies like the CA/Browser Forum frequently prohibit creating new artifacts using outdated standards or practices (such as prohibiting the issuance of new certificates signed with SHA-1). However, these changes sometimes create significant gaps by exempting existing infrastructure from the scope of improved requirements, allowing legacy CAs and practices to remain valid and trusted simply because they were created before a certain date.

This creates a fragmented security model where "legacy" infrastructure operates under outdated rules, effectively indefinitely. While SHA-1, which still appears in time-valid CA certificates and CRLs trusted by Chrome, is the most prominent example, this issue extends to other legacy practices that should no longer be considered relevant or acceptable in 2026 and beyond. The Chrome Root Program is exploring steps to close these gaps by removing exceptions for legacy systems and practices, ensuring that all trusted PKI artifacts, regardless of their creation date or inclusion in the Chrome Root Store, adhere to modern security standards.

Why it matters:

Areas of future exploration:

The following initiatives are planned for future exploration by the Chrome Root Program Team. As observed with several areas of past exploration, for example "Multi-Perspective Issuance Corroboration," the Chrome Root Program Team looks forward to pursuing these security-enhancing initiatives within the CA/Browser Forum Server Certificate Working Group, when appropriate.

Verifiable and Reproducible Domain Control Validation

Themes: (1) "Increasing accountability and ecosystem integrity" and (2) "Streamlining and improving domain control validation practices"

Understanding reproducible validation: Currently, Domain Control Validation (DCV) is often an opaque process: a CA generates a random challenge, communicates it to the certificate requestor, performs a check (like querying a DNS record) from its own internal perspective, logs success, and issues the certificate. This process can take less than a second yet can have long-lasting security implications. If a bug or vulnerability is later discovered in the CA's validation logic, there is no way to verify if the validation actually succeeded at that time, often necessitating mass revocations to protect the ecosystem.

"Reproducible" Domain Control Validation proposes a model where the proof of domain control is made publicly and persistently available, allowing any party, not just the issuing CA, to independently and retroactively verify the validation's legitimacy. Defining this model's practical implementation is a key objective we look forward to pursuing with the broader community.

Why it matters:

Further promoting adoption of ARI and ARI-like capabilities

Themes: (1) "Promoting automation" and (2) "Encouraging modern infrastructures and agility"

Understanding ARI: ACME Renewal Information (ARI) is a standard that transforms certificate renewal from a static, client-driven guess into a dynamic, server-driven signal. Instead of clients hard-coding renewal logic (e.g., "renew 30 days before expiration"), ARI allows the CA to explicitly signal when a certificate should be renewed.

While simple in concept, this capability is critical for ecosystem resilience. It creates a direct communication channel for CAs to prioritize specific renewals, whether to smooth out infrastructure load or to urgently replace certificates in response to security incidents.

Why it matters:

Past accomplishments:

Sunset less secure DCV methods

Themes: (1) "Encouraging modern infrastructures and agility", (2) "Focusing on simplicity", (3) "Promoting automation", (4) "Reducing misissuance", (5) "Increasing accountability and ecosystem integrity", and (6) "Streamlining and improving domain control validation practices"

Understanding DCV sunsets: DCV is a security-critical process designed to ensure that certificates are only issued to a legitimate domain operator. This prevents unauthorized entities from obtaining a certificate for a domain they do not control. Without this check, an attacker could obtain a valid certificate for a legitimate website and use it to impersonate that site or intercept web traffic.

Historically, the ecosystem permitted validation methods that relied on "indirect" communication channels like email or phone calls. These methods, some of which were proven vulnerable, represent a "weak link" in the security chain because they only demonstrate that an applicant can interact with a contact associated with the domain, rather than proving direct administrative control over the domain's infrastructure. Furthermore, these methods inherit the vulnerabilities of their underlying channels, such as BGP hijacking, SIM swapping, and opportunistic TLS downgrades, and expand the attack surface by involving third-party service providers.

To address this, the Chrome Root Program collaborated with members of the ecosystem in the CA/Browser Forum to pass Ballots SC-080, SC-090, and SC-091. These ballots sunset these legacy methods in favor of automated, cryptographically verifiable alternatives (like ACME-based DNS or HTTP challenges) that confine the attack surface to the validated domain itself.

Why it matters:

Phase out "multi-purpose roots" from the Chrome Root Store

Themes: (1) "Encouraging modern infrastructures and agility" and (2) "Focusing on simplicity"

Understanding dedicated hierarchies: Certificates issued by publicly-trusted CA Owners (i.e., those included in various product and operating system trust stores) serve various use cases including TLS server authentication, TLS client authentication, secure email (e.g., signed and encrypted email), document signing, code signing, and others. Up until about 2018, it was common to see some or all of these use cases served from a single PKI hierarchy. While this approach offered flexibility to some stakeholders, balancing multiple, sometimes competing use cases and requirements presents inherent complexity, especially as the CA/Browser Forum created additional standards focused on use cases beyond TLS.

Beginning in September 2022, the Chrome Root Program codified its commitment to simplicity by requiring applicant PKI hierarchies submitted for inclusion in the Chrome Root Store focus only on serving TLS use cases. However, while that approach promoted future simplicity, not all CA certificates included in the Chrome Root Store aligned with this principle. To address this, and to completely realize the benefits of the transition to TLS-dedicated hierarchies, Chrome Root Program Policy Version 1.6 established a future phase-out of existing "multi-purpose" root CA certificates, or those CA certificates not dedicated to TLS server authentication use cases, from the Chrome Root Store. The adoption process is ongoing, but is expected to complete by the end of 2027.

Why it matters:

Reduced certificate lifetimes and validation reuse

Themes: (1) "Encouraging modern infrastructures and agility", (2) "Promoting automation", and (3) "Streamlining and improving domain control validation practices"

Understanding certificate lifetimes and validation reuse: Certificates represent a "point-in-time" state of reality; the more time passes from the moment of issuance, the more likely it becomes that the data represented in the certificate diverges from reality. For years, the Chrome Root Program advocated for shorter certificate lifespans to address this divergence and improve ecosystem agility. This effort, with collaboration from other members of the ecosystem, culminated in Ballot SC-081v3, which was passed by the CA/Browser Forum in 2025.

This ballot establishes a roadmap to reduce the maximum validity of publicly-trusted TLS certificates from 398 days down to 47 days. It also introduces a significant reduction in DCV reuse periods, eventually bringing the limit for reusing validation data down to just 10 days. Previously, a single validation check could be used for over two years, creating a risk that certificates were issued based on stale ownership information. These changes are scheduled to phase in starting March 2026 and will conclude in March 2029.

Why it matters:

Require "Multi-Perspective Issuance Corroboration"

Themes: (1) "Increasing accountability and ecosystem integrity" and (2) "Streamlining and improving domain control validation practices"

Understanding Multi-Perspective Issuance Corroboration:

Despite the then existing domain control validation requirements defined by the CA/Browser Forum, peer-reviewed research authored by the Center for Information Technology Policy of Princeton University (1 and 2) and others (e.g., 3) highlights the risk of equally-specific prefix Border Gateway Protocol (BGP) attacks or hijacks resulting in fraudulently issued certificates. This risk is not merely theoretical, as it has been demonstrated that attackers have successfully exploited this ongoing vulnerability on numerous occasions, with just one of these attacks resulting in approximately $2 million dollars of direct losses.

Multi-Perspective Issuance Corroboration (referred to as "MPIC"), sometimes referred to as "Multi-Perspective Domain Validation" ("MPDV") or "Multi-VA", enhances existing domain control validation methods by reducing the likelihood that routing attacks can result in fraudulently issued certificates. Rather than performing domain control validation and authorization from a single geographic or routing vantage point, which an adversary could influence as demonstrated by security researchers, MPIC implementations perform the same validation from multiple geographic locations and/or Internet Service Providers and have been observed as an effective countermeasure against ethically conducted, real-world BGP hijacks (4).

The Chrome Root Program led a work team of ecosystem participants which culminated in a CA/Browser Forum Ballot to require adoption of MPIC via Ballot SC-067. The ballot received unanimous support from organizations who participated in voting, and the adoption process is ongoing.

Why it matters:

Establishing minimum expectations for linting

Themes: (1) "Encouraging modern infrastructures and agility" and (2) "Reducing misissuance"

Understanding linting:

Linting refers to the automated process of analyzing X.509 certificates for errors, inconsistencies, and adherence to best practices and industry standards. Linting ensures certificates are well-formatted and include the necessary data for their intended use, such as website authentication. There are numerous open-source linting projects in existence (e.g., certlint, pkilint, pkimetal, x509lint, and zlint), in addition to numerous custom linting projects maintained by members of the Web PKI ecosystem.

The Chrome Root Program participated in drafting CA/Browser Forum Ballot SC-075 to require adoption of certificate linting. The ballot received unanimous support from organizations who participated in voting, and the adoption process is ongoing.

Why it matters:

Root CA term-limit

Theme: "Encouraging modern infrastructures and agility"

In Chrome Root Program Policy 1.5, we landed changes that set a maximum "term-limit" (i.e., period of inclusion) for root CA certificates included in the Chrome Root Store to 15 years.

While we still prefer a more agile approach, and may again explore this in the future, we encourage CA Owners to explore how they can adopt more frequent root rotation.

Why it matters:

Improve automation support

Themes: (1) "Encouraging modern infrastructures and agility", (2) "Focusing on simplicity" and (3) "Promoting automation"

In Chrome Root Program Policy 1.5, we landed changes that require Applicant hierarchies to support automated certificate issuance and management. For more information on automation, refer to our blog post: "Unlocking the power of automation for a safer and more reliable Internet."

Why it matters:

Make OCSP optional and incentivize automation

Themes: (1) "Encouraging modern infrastructures and agility", (2) "Focusing on simplicity", and (3) "Promoting automation"

We proposed and collaborated with members of the CA/Browser Forum Server Certificate Working Group to pass Ballot SC-063 which transitioned support for the Online Certificate Status Protocol (OCSP) from mandatory to optional within the TLS Baseline Requirements. The ballot also incentivized adoption of automation solutions by standardizing the definition of a "short-lived certificate" which is exempt from certificate revocation requirements defined in Section 4.9.1 of the TLS Baseline Requirements. Ballot SC-063 became effective on March 15, 2024.

Why it matters:

Clarify certificate profiles

Themes: (1) "Focusing on simplicity" and (2) "Reducing misissuance"

We proposed and collaborated with members of the CA/Browser Forum Server Certificate Working Group to pass Ballot SC-062 which clarified and improved upon the existing certificate profiles included within Section 7 of the TLS Baseline Requirements. The ballot received unanimous support from organizations who participated in voting and became effective on September 15, 2023.

Why it matters: