Skip to content

March 2026 update#20

Open
kasirota wants to merge 5 commits intomainfrom
March-2026-Update
Open

March 2026 update#20
kasirota wants to merge 5 commits intomainfrom
March-2026-Update

Conversation

@kasirota
Copy link
Copy Markdown
Contributor

No description provided.

kasirota added 5 commits March 4, 2026 15:10
Clarify requirements for root certificates and their scopes.
Updated validity period for newly minted Root CAs to a maximum of 10 years, effective July 1, 2026.
Added clarification on Microsoft’s classification of suspect code and its relation to the Unified Security Operations criteria.
Added requirement for Certificate Authorities to disclose incident reports in Bugzilla and notify Microsoft.
Comment thread Requirements.md
- This EKU is used for signing documents within Office. It isn't required for other document signing uses.

**3.4.3** Effective for all root certificates submitted on or after July 1, 2026:
Effective for all root certificates submitted on or after July 1, 2026, root certificates MUST be limited in scope and dedicated to a clearly defined trust purpose.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Considering that the id-kp-clientAuth KeyPurposeId is allowed further below, please consider making the following change:

Suggested change
Effective for all root certificates submitted on or after July 1, 2026, root certificates MUST be limited in scope and dedicated to a clearly defined trust purpose.
Effective for all root certificates submitted on or after July 1, 2026, root certificates MUST be limited in scope and dedicated to clearly defined trust purposes.

Comment thread Requirements.md
**3.1.7.** Root Key Sizes must meet the requirements detailed in "Signature Requirements" below.

**3.1.8.** Newly minted Root CAs must be valid for a minimum of eight years, and a maximum of 25 years, from the date of submission.
**3.1.8.** Newly minted Root CAs must be valid for a maximum 10 years, from the date of submission, effective July 1, 2026.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems this requirement limits the usage of cross-signing chains, leading to breakage on devices older than 10 years old. I'm just wondering if this is also an intended outcome?

Comment thread Requirements.md
Effective for all root certificates submitted on or after July 1, 2026, root certificates MUST be limited in scope and dedicated to a clearly defined trust purpose.
Root certificates authorized for Server Authentication, S/MIME, or Code Signing MUST each be separate and independent trust anchors. A root certificate MUST NOT be authorized for more than one of these EKUs.
A root certificate authorized for Code Signing MAY also be authorized for Client Authentication and Time Stamping. A root certificate authorized for Server Authentication OR SMIME MAY also be authorized for Client Authentication.
No EKU combinations other than those explicitly permitted above are allowed.Root certificates submitted prior to January 1, 2027 that assert multiple EKUs will continue to be trusted unless otherwise directed by Microsoft.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The list above does not allow for the issuance of Code Signing Certificates

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants