Chrome has published version 1.6 of their root store policy.

Notably, this contains a timeline for deprecating use of the TLS Client Auth extended-key-usage inside the PKIs included in their program.
If you currently use TLS Client Auth from a publicly trusted CA, you may need to take action.

> ... certificates issued on or after June 15, 2026 MUST include the extendedKeyUsage extension and only assert an extendedKeyUsage purpose of id-kp-serverAuth.

https://www.chromium.org/Home/chromium-security/root-ca-policy/#32-promote-use-of-dedicated-tls-server-authentication-pki-hierarchies

Chrome Root Program Policy, Version 1.6

@mattm and one more certificate issue to handle (server and client auth EKU certificates) in my company after the coming certificate lifetime reduction.

Hard times currently in corporate envs due to public certs 😔

@mattm thanks a lot @mattm for alerting us 🙏