yanlislikla ssl sertifikasi yerine sub-ca sertifikasi issue etmis olan sertifika kurumudur.
update'i yukledikten sonra, mmc ile certificates snap-inin acip local computer ve user accountunuzu ekleyip untrusted certificates altinda ;
*.google.com *.ego.gov.tr ?4d 85 47 b7 f8 64 13 2a 7f 62 d9 b7 5b 06 85 21 f1 0b 68 e3
*.ego.gov.tr turktrust elektronik sunucu sertifikasi hizmetleri ?f9 2b e5 26 6c c0 5d b2 dc 0d c3 f2 dc 74 e0 2d ef d9 49 cb
e-islem.kktcmerkezbankasi.org turktrust elektronik sunucu sertifikasi hizmetleri ?c6 9f 28 c8 25 13 9e 65 a6 46 c4 34 ac a5 a1 d2
olup olmadigini kontrol etmekte fayda var.
ek olarak yaptiklari islemi agustos ayinda yapmislar yani 1,5 senedir olan oldu.
" in response, we updated chrome’s certificate revocation metadata on december 25 to block that intermediate ca, and then alerted turktrust and other browser vendors. turktrust told us that based on our information, they discovered that, ==== in august 2011 =======, they had mistakenly issued two intermediate ca certificates to organizations that should have instead received regular ssl certificates. on december 26, we pushed another chrome metadata update to block the second mistaken ca certificate and informed the other browser vendors. "
our actions addressed the immediate problem for our users. given the severity of the situation, we will update chrome again in january to no longer indicate extended validation status for certificates issued by turktrust, though connections to turktrust-validated https servers may continue to be allowed.
since our priority is the security and privacy of our users, we may also decide to take additional action after further discussion and careful consideration"http://googleonlinesecurity.blogspot.com/…rity.html