The popular internet browsers Google Chrome and Mozilla Firefox have recently announced their plans to distrust any SSL cer­ti­fic­ates issued by the company Symantec before 1st December, 2017. An SSL cer­ti­fic­ate is an important aspect of a website that handles sensitive, personal in­form­a­tion. Symantec’s Web Security and other PKI solutions have been taken over by the company DigiCert – this ac­quis­i­tion will result in DigiCert updating and mod­ern­ising several aspects of the Symantec model. However, in the meantime, Chrome and Mozilla have decided to remove trust in Symantec SSL cer­ti­fic­ates until these updates are completed.

Why are these SSL cer­ti­fic­ates being targeted?

Chrome and Mozilla’s decision to distrust SSL cer­ti­fic­ates results from a small number of dis­crep­an­cies in SSL cer­ti­fic­ates issued by them between 2015 and now. The main criticism was about Symantec’s ability to ensure a proper au­then­tic­a­tion process for SSL cer­ti­fic­ates. Debates between Symantec and the browser community have spread over several months and have concluded with two main action points laid down by Google Chrome and later confirmed by Mozilla:

  1. Symantec must partner up with another Cer­ti­fic­ate Authority to run the SSL au­then­tic­a­tion and issuance processes from a new in­fra­struc­ture.

  2. All SSL cer­ti­fic­ates issued from prior Symantec roots will be dis­trus­ted and need to be replaced without extra cost following phased timeline.

Shortly after this decision, Symantec sold their SSL business to Digicert and started issuing fully compliant SSLl cer­ti­fic­ates from their new CA in­fra­struc­ture on 1st December, 2017.

Whilst Chrome and Mozilla may be acting in the interest of their customers safety, there are a number of browsers such as Internet Explorer, Safar and Opera who are choosing not to display warning messages to visitors, as they do not believe the threat to be as serious as Chrome and Mozilla claim. Re­gard­less of severity of the security risk, plenty of website operators may have their website affected by this campaign of distrust.

When will SSL cer­ti­fic­ates be affected?

Chrome will begin issuing security warnings on the 16th April, 2018 to Chrome 66 (and later) users when they try to access a Symantec SSL-encrypted website. This warning will appear on all Symantec SSL cer­ti­fic­ates issued before the 1st June, 2016. From October 2018, Chrome 70 (and above) users will also receive the message on all sites that contain Symantec SSL cer­ti­fic­ates issued before  1st December, 2017. The warning message simply states that the data exchange may be unsafe. Visitors can accept the warning and continue on to the website unimpeded: the website’s func­tion­al­ity will remain un­af­fected. There is no risk to any data on your website being com­prom­ised.

How do I know if my cer­ti­fic­ate is affected?

In order to work out whether or not your website’s SSL cer­ti­fic­ates will be affected by this change, you will need to check the validity of the cer­ti­fic­ate. There are a number of online tools that can help you assess the validity of your SSL cer­ti­fic­ates – simple research, select and download your program to check their cer­ti­fic­ate validity. Al­tern­at­ively, checking the validity through your own browser is quite straight­for­ward. Here, we will show you how to check whether your SSL cer­ti­fic­ates are in date or not on Google Chrome and Mozilla Firefox.

Google Chrome

To check the status of your SSL cer­ti­fic­ate on Chrome, select the icon next to the URL. This may be a green lock (con­nec­tion secure), a yellow ex­clam­a­tion mark (no cer­ti­fic­ate provided), a blank page symbol (this website does not need prior au­then­tic­a­tion), a lock symbol with a yellow triangle (cer­ti­fic­ate provided, but security standard is low) or a red padlock (site has cer­ti­fic­ate issues).  Click on the symbol present and a window will pop up with an option to view the cer­ti­fic­ate:

Go to the “Details” tab in the second popup window and you will be able to find the validity period dates for the website’s cer­ti­fic­ate.

Mozilla Firefox

The process for checking the validity of an SSL cer­ti­fic­ate on Mozilla Firefox is more or less the same as checking on Chrome. Next to the URL should be a security symbol – either a green padlock (secure), grey padlock with a yellow ex­clam­a­tion triangle (con­nec­tion may not be secure) or a grey packlock with a red line through it (con­nec­tion not secure). Clicking on the security symbol will bring up a small pop up window:

Simply click on the arrow next to the website con­nec­tion in­form­a­tion and another window will pop open. In the General tab of the pop up window, the Period of Validity will be on display at the bottom.

Re­place­ment Timeline & Actions Required

The timeline consists of two phases which match Google Chrome 66 & 70 version releases:

Phase I –Cer­ti­fic­ates issued before 1st June, 2016 will be dis­trus­ted by Chrome 66. You will need to renew SSL cer­ti­fic­ates issued before this date on before 15th March, 2018.

Phase II – If your SSL cer­ti­fic­ate was issued after 1st December, 2017 then there is no need to reissue it. Cer­ti­fic­ates issued before 1st December, 2017 will be dis­trus­ted by Chrome 70. Any SSL cer­ti­fic­ates issued before this date will need to be replaced by 13th September, 2018. With Chrome 66 you may already notice a warning in Chrome Developer Tools:

If the SSL cer­ti­fic­ate is not replaced before Chrome 70 is released, then your customers will no longer be able to access your site:

Taking Action

All affected SSL cer­ti­fic­ates need to be replaced through a Reissue operation. This provides a new cer­ti­fic­ate for the same domain, with the same ex­pir­a­tion date as the one replaced.

Note

If your cer­ti­fic­ate expires before the 13th September, 2018 (Chrome 70 beta), there’s no need to take any action.

Symantec/DigiCert are offering affected customers a new SSL cer­ti­fic­ate free of charge. You will need to create a CSR (Cer­ti­fic­ate Signing Request) for each of the cer­ti­fic­ates you wish to replace/have reissued, which is a standard procedure for sending DigiCert your public key, in­form­a­tion about your company and your domain name. Submit your request, and once DigiCert have re­val­id­ated your domains and or­gan­isa­tions, you will receive the new cer­ti­fic­ate which you can install.

Go to Main Menu