Últimas notícias

Fique informado

Maximum SSL/TLS Certificate Validity is Now One Year. By Patrick Nohe

1 de julho de 2020

Spotlight

Doc9 lança Guia Prático de Prompts para ChatGPT no Jurídico: Como Maximizar a Eficiência com a Inteligência Artificial

Para obter os melhores resultados com o ChatGPT no contexto jurídico, siga as dicas importantes do Guia Prático de Prompts da doc9.

28 de maio de 2024

Governo Federal apoia Rio Grande do Sul na emissão 2ª via da Carteira de Identidade Nacional

O mutirão coordenado pelo Governo do RS começou nos abrigos de Porto Alegre. Expedição da segunda via será imediata

20 de maio de 2024

What to Expect from Brazil’s New Data Protection Law

The European GDPR (General Data Protection Regulation) is one of the most influential consumer privacy laws that has affected 500,000 companies throughout the world.

29 de junho de 2020

HTTP Status Codes Command This Malware How to Control Hacked Systems

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe

15 de maio de 2020

Apesar da mudança recente da Apple, você não precisa substituir seus certificados SSL e TLS, ainda.

Como todas as autoridades certificadoras, procuramos ativamente melhorar a Internet e torná-la um local mais seguro para socializar e fazer negócios, diz Lila Kee, General Manager for GlobalSign’s North and South American Operations.

10 de março de 2020

Starting on September 1st, SSL/TLS certificates cannot be issued for longer than 13 months (397 days). This change was first announced by Apple, at the CA/Browser Forum Spring Face-to-Face event in Bratislava back in March

By Patrick Nohe

Patrick Nohe – Senior Product Marketing Manager at GlobalSign

Then last week, at the CA/B Forum’s Summer event (held virtually), Google announced its intention to match Apple’s changes with its own root program.

There is also a browser-driven ballot that seeks to align the industry’s baseline requirements with the new root program changes. That issue is currently being debated by the Forum.

We realize there might be a lot to unpack here, so in the interest of providing a little clarity we’re going to cover it in this blog post.

The reason for shorter SSL/TLS certificate lifespans

From a high-level, theoretical standpoint there are two primary benefits for shorter-lived certificates:

The first is the technical component – longer lifespans means it takes longer to organically roll out updates or changes. A real-world example would be the SHA1-to-SHA2 transition.

Unless you’re going to revoke a whole bunch of certificates and force the customer to re-issue, it can take years before all of the old certificates are replaced. In the case of SHA1, it took three. That creates risk.

The other benefit has to do with identity – how long should the information used to validate an identity stay trusted? The longer between validation, the greater the risk. Google has said that in an ideal world domain validation would occur about every six hours.

Before 2015 you could get an SSL/TLS certificate issued for up to five years. That was reduced to three, and then again in 2018 to two. At the end of 2019, a ballot was proposed at the CA/B Forum that would have reduced it to one year – it was voted down soundly by the Certificate Authorities.

So, why are certificate still being reduced to one year?

The CA/Browser forum is an industry group that meets to vote on a set of baseline requirements for the issuance of trusted digital certificates. What it is not, however, is a governing body. Even though the CAs expressed concerns and reluctance to decrease max validity again, Apple and Google are well within their right to update the policies for their root programs as they see fit.

We understand that we’ve just thrown a whole bunch of industry terms at you, so let’s step back real quick and make sure the previous paragraph makes sense.

Certificate Authorities and browsers have an interdependent relationship. Browsers need to use certificates to make trust determinations about websites and for help securing connections. On the CA side, what good is a public certificate if it’s not trusted by a browser?

The way this is all managed is through the root programs. There are four major root programs of note:

•Microsoft

•Apple

•Mozilla

•Google ( the last two known as Googzilla – lol)

Incidentally, you’ll notice those four are also behind the major browsers on both desktop and mobile. In order for a CA to have its certificates trusted by the root programs, and by extension the browsers and OSs that make use of them, it must adhere to that root program’s guidelines. The CA/B Forum is an industry forum that ideally helps to facilitate changes to the root programs (and the ecosystem itself).

But the root programs, which participate as browsers, can still act unilaterally and make changes as they see fit. When this happens, the need for interoperability basically dictates that whatever root program policy has the most stringent standards becomes the new de facto baseline requirement.

That’s how we got here. Now let’s talk about what this means for your website.

What shorter SSL/TLS validity means for website owners

First things first, this goes into effect September 1, 2020. So, if you’re using a two-year certificate that was issued before September 1, your certificate will stay valid until its original expiration date. You just won’t be able to renew for two years moving forward.

Or to put it another way, you have until the first of September to get two-year certs. After that they will be relegated to the desktop recycling bin of history.

From a bigger-picture standpoint, this might be a good time to start giving consideration to automating more of your certificate lifecycle management functions. Especially for larger organizations managing dozens of publicly-trusted website certificates, but also for organizations using publicly-trusted email certificates, as well as any organization leveraging a private CA or PKI-based electronic signatures.

You might also consider moving some certificates from public to private trust, which also helps with management – you could even issue certs with longer validity using that method.

Otherwise, the way things are headed with the root programs continuing to push for shorter validity – organizations are pretty much going to be forced to automate a lot of these things at some point in the future.

Better to explore that now than when your feet are being pressed to the fire.

How GlobalSign will handle one-year certificates

In the interest of simplicity – making the process as straightforward as possible – GlobalSign will provide SSL/TLS customers with the maximum validity of 397 days when they order one-year certificates starting on 31 August. This applies to new orders and renewals, to provide maximum validity for our customer’s benefit.

You will still want to renew your certificate before it expires, but since we can no longer provide up to 90 additional days to your validity, we recommend you renew within 30 days of expiration.

What about reissuing my certificates?

You may wonder what happens when you reissue one of your two-year certificates after this change goes into effect.  Well, we have good news for you!  If you reissue a certificate and lose validity (we’re required to limit validity to 397 days), you can reissue the certificate later – ideally less than 397 days prior to your original cert expire – and recover the lost validity from your first reissue!

This works the same way it did in 2018 when we went from three-year max validity down to two years.

One item to note is that the EV reissue process is a bit different, due to the EV Guidelines (EVGL) requirements for reissuing certificates.  While you can still reissue your certificates, they will be queued for manual review and we’ll need to be sure all validations are up to date before we can release it.

Source: GlobalSign

Online Identity Is Important: Let’s Upgrade Extended Validation. By Patrick Nohe 

O que acontece quando o seu certificado SSL expira? Por Patrick Nohe

A importância da boa administração dos certificados SSL/TLS para se evitar interrupção de serviços e impedir ataques hackers

14 Tech Pros Predict The Next Big Thing in Cybersecurity And Encryption

Blockchain and Decentralized Identity: How Transparency Can Improve Identity Verification for Banks

The Complete Guide to Domain Names: What Are They and How Do They Work

Present your solution and services on Crypto ID!  

Our purpose is to attend our readers interesting, therefore, we select our articles and announcing companies. Content and advertisement should be relevant to IT market, encryption and digital identification. If your company is part of this universe, download your media kit, write to us and be part of Crypto ID!

ACCESS OUR MEDIA KIT

contato@cryptoid.com.br   
+55 11 3881 0019