<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: SSL Support</title>
    <description>The latest articles on DEV Community by SSL Support (@ssl_support).</description>
    <link>https://dev.to/ssl_support</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F279382%2F80ea9f77-3134-44ab-8f5f-962c5d592188.png</url>
      <title>DEV Community: SSL Support</title>
      <link>https://dev.to/ssl_support</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ssl_support"/>
    <language>en</language>
    <item>
      <title>Free SSL Provider- Let's Encrypt Revoke millions of Certificates.</title>
      <dc:creator>SSL Support</dc:creator>
      <pubDate>Thu, 05 Mar 2020 06:16:25 +0000</pubDate>
      <link>https://dev.to/ssl_support/free-ssl-provider-let-s-encrypt-revoke-millions-of-certificates-2md8</link>
      <guid>https://dev.to/ssl_support/free-ssl-provider-let-s-encrypt-revoke-millions-of-certificates-2md8</guid>
      <description>&lt;p&gt;Let’s Encrypt – the world-leading Free SSL Certificate authority (CA), has announced that it will revoke more than 3 million SSL/TLS Certificate by 4th March 2020. The cause of the revocation is a bug which was discovered by Let’s Encrypt.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://community.letsencrypt.org/t/2020-02-29-caa-rechecking-bug/114591"&gt;Lets Encrypt confirmed&lt;/a&gt; that a bug in Boulder ignored CAA Checks in a forum post on 29th February 2020. However, this news barely gave time to their user to react to it.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Also Read:&lt;a href="https://www.https.in/blog/risks-of-a-free-ssl-certificate/"&gt; The Risk of Free SSL Certificate&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;Let’s Encrypt is going for a short revocation timeline in order to meet the stipulation by the CA/B Forum’s baseline requirement. That means many people who are using let’s encrypt certificates aren’t aware and can be affected by this.&lt;/p&gt;

&lt;p&gt;So, why is Let’s Encrypt revoking these certificates and what does the website owner have to do with an affected certificate from Let’s Encrypt.&lt;/p&gt;

&lt;h2&gt;Why Let’s Encrypt certificate been revoked?&lt;/h2&gt;

&lt;p&gt;Let’s Encrypt announced there was a bug in their code which allowed the issuance of SSL Certificate without going through proper domain record checks. This resulted, let’s Encrypt to revoke more than 3 million valid SSL certificates out of their total 116 million certificates. To be more specific, the bug affected Boulder – the server software that Let’s Encrypt uses to verify the users and their domains before issuing an SSL certificate.&lt;/p&gt;

&lt;p&gt;The lead developer from the Let’s Encrypt Jacob Hoffman-Andrews, post a statement on the Mozilla’s Bugzilla Web Forum:&lt;/p&gt;

&lt;p&gt;"On 2020-02-29 UTC, Let’s Encrypt found a bug in our CAA code. Our CA software, Boulder, checks for CAA records at the same time it validates a subscriber’s control of a domain name. Most subscribers issue a certificate immediately after domain control validation, but we consider a validation good for 30 days. That means in some cases we need to check CAA records a second time, just before issuance. Specifically, we have to check CAA within 8 hours prior to issuance (per BRs §3.2.2.8), so any domain name that was validated more than 8 hours ago requires rechecking."&lt;/p&gt;

&lt;p&gt;"The bug: when a certificate request contained N domain names that needed CAA rechecking, Boulder would pick one domain name and check it N times. What this means in practice is that if a subscriber validated a domain name at time X, and the CAA records for that domain at time X allowed Let’s Encrypt issuance, that subscriber would be able to issue a certificate containing that domain name until X+30 days, even if someone later installed CAA records on that domain name that prohibit /issuance by Let’s Encrypt."&lt;/p&gt;

&lt;p&gt;They discovered the bug at 03:08 UTC on 29 Feb and halted issuance at 03:10. Further, they deployed a fix at 05:22 UTC and then re-enabled issuance. On the preliminary investigation, it was found that the bug was introduced on 25th July 2019.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;In simple words:&lt;/b&gt; Lets Encrypt must revoke the SSL Certificate because it didn’t check the CAA records within 8 hours prior to the certificate being issued due to the bug in its software.&lt;/p&gt;

&lt;h2&gt;What options do the users of Let’s Encrypt certificate have?&lt;/h2&gt;

&lt;h3&gt;Step 1: Check the Certificate&lt;/h3&gt;

&lt;p&gt;The website owner or webmasters or system administrators having Lets Encrypt SSL Certificate can &lt;a href="https://checkhost.unboundtest.com/"&gt; use the tool&lt;/a&gt; to verify if their certificate is been impacted or not by simply entering the domain name. They can also &lt;a href="https://letsencrypt.org/caaproblem/"&gt; visit this page&lt;/a&gt; which hosts the list of affected serial numbers.&lt;/p&gt;

&lt;h3&gt;Step 2: Renew the Certificate&lt;/h3&gt;

&lt;p&gt;Once you have determined that you are using the impacted Let’s Encrypt certificate, the next step for you is to renew the certificate. Users can renew the certificate either from a Trusted Certificate Authority or go for a Free untrusted SSL Certificate Authority.&lt;/p&gt;

&lt;p&gt;It's always wise to have a trusted Certificate on your network or server. Also, all reputed companies use a trusted SSL Certificate for their security. &lt;a href="https://www.https.in/renew-ssl-certificate"&gt;Renew SSL Certificate&lt;/a&gt; at affordable cost and secure your website without any worries.&lt;/p&gt;

&lt;p&gt;Sometimes it feels a burden to renew the certificate and install it again. Well, you can make your life easy, by simply visiting the best &lt;a href="https://www.ssl.support/"&gt; SSL Installation Service Provider&lt;/a&gt; named SSL.Support. They install your certificate on any type of server with ease. So now relax and let SSL.Support install your certificate.&lt;/p&gt;

&lt;p&gt;Read the actual article on &lt;a href="https://www.ssl.support/blog/lets-encrypt-certificates-been-revoked/"&gt;Let’s Encrypt to Revoke 3 Million SSL Certificates&lt;/a&gt;&lt;/p&gt;

</description>
      <category>letsencrypt</category>
      <category>freesslcertificate</category>
      <category>sslcertificate</category>
    </item>
    <item>
      <title>Fix NET: ERR_CERTIFICATE_TRANSPARENCY_REQUIRED Error</title>
      <dc:creator>SSL Support</dc:creator>
      <pubDate>Fri, 14 Feb 2020 12:09:28 +0000</pubDate>
      <link>https://dev.to/ssl_support/fix-net-errcertificatetransparencyrequired-error-54</link>
      <guid>https://dev.to/ssl_support/fix-net-errcertificatetransparencyrequired-error-54</guid>
      <description>&lt;h2&gt;What is Certificate Transparency Required Error?&lt;/h2&gt;

&lt;p&gt;It is one of the SSL errors which occurs when a user is trying to visit a secure website that is having SSL certificate errors and which creates the problem of connection between a user device and the remote server.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;The main reason for “Certificate Transparency Required Error” are as followed:&lt;/b&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The Certificate Authority hasn’t entered the website’s SSL Certificate to the &lt;br&gt;
Certificate Transparency log which may lead to fraud or negligence on the part of the Certificate Authority (CA’s).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The owner of the website itself has notified the Certificate Authority not to enter the domain or any sub-domains to transparency log in order to keep certificate information private.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Certificate Transparency (CT) Implementation&lt;/h3&gt;

&lt;p&gt;In March 2013, Google officially launched the first certificate transparency log. After a few months, Digi Cert became the first Certificate Authority (CA) to implement Certificate Transparency. Thereafter it was made compulsory to log the details of the issued SSL certificate in a CT log.&lt;/p&gt;

&lt;p&gt;Certificate Transparency (CT) is an internet security standard that mandates the practice of maintaining public logs of all the digital certificates that are issued by trusted certificate authorities (CAs).&lt;/p&gt;

&lt;h2&gt;Steps for how to Fix ERR_CERTIFICATE_TRANSPARENCY_REQUIRED Error&lt;/h2&gt;

&lt;h3&gt;Solution for Website Owner&lt;/h3&gt;

&lt;p&gt;This is the only way through which this error can be resolved. The website owner needs to contact the Certificate Authority (CA) and inform about this issue. Tell them to add the website’s SSL Certificate to the CT log.&lt;/p&gt;

&lt;p&gt;Also check with the CA’s, regarding if there are any technical errors on CA’s behalf. If so, then reissue the SSL Certificate and reinstall it on your website. I know sometimes install an SSL certificate is altogether a new challenge. There is an option to go for the Free &lt;a href="https://www.ssl.support/ssl-installation-on-c-panel"&gt;SSL Installation on C-Panel&lt;/a&gt; and install the certificate without any hassle.&lt;/p&gt;

&lt;p&gt;If you still don’t get any proper response from your Certificate Authority (CA), then it is recommended to change your exiting CA with the reputed one like Digi Cert, Rapid SSL, Sectigo (Formerly Comodo), Geo Trust, etc.&lt;/p&gt;

&lt;p&gt;Learn more on how to &lt;a href="https://hackernoon.com/know-how-to-fix-net-err_certificate_transparency_required-error-2fqy362t"&gt;Fix Certificate Transparency Error&lt;/a&gt; on Website Browser.&lt;/p&gt;

</description>
      <category>sslerrors</category>
      <category>security</category>
      <category>sslcertificate</category>
    </item>
    <item>
      <title>How does delegated credential works?</title>
      <dc:creator>SSL Support</dc:creator>
      <pubDate>Mon, 25 Nov 2019 12:22:04 +0000</pubDate>
      <link>https://dev.to/ssl_support/how-does-delegated-credential-works-19e0</link>
      <guid>https://dev.to/ssl_support/how-does-delegated-credential-works-19e0</guid>
      <description>&lt;p&gt;IETF community has proposed Delegated Credentials for TLS to mitigate the above-mentioned issue. As it is a new cryptographic protocol that balances the trade-off between lifetime and reliability.&lt;/p&gt;

&lt;p&gt;Delegated Credentials for TLS allows companies to take partial control over the process of signing new certificates for themselves. This certificate uses a private key with a shorter time period than the actual certificate.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.ssl.support%2Fblog%2Fwp-content%2Fuploads%2F2019%2F11%2FDelegated-Credentials-1024x576.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.ssl.support%2Fblog%2Fwp-content%2Fuploads%2F2019%2F11%2FDelegated-Credentials-1024x576.jpg" alt="alt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The private key with a shorter period – Delegated credential used generated by the server and not by the Certificate Authority.&lt;/p&gt;

&lt;p&gt;The delegated credential consist of the following things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Public key&lt;/li&gt;
&lt;li&gt;The new private key (the expiry date of the delegated credentials), and&lt;/li&gt;
&lt;li&gt;The signature of delegated credentials signed by the CA issued leaf&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The delegated credentials secure the connection between a web browser and the server, as it has its own public key.&lt;/p&gt;

&lt;p&gt;The website owners can now actively participate in generating a Certificate that has a distinct public and private keys.&lt;/p&gt;

&lt;p&gt;Delegated Credential uses a different private key with a shorter period on each server. As it uses a different private key on each server, there is less window of opportunity for a hacker to perform a cyber attack.&lt;/p&gt;

&lt;p&gt;Read More about &lt;a href="https://www.ssl.support/blog/delegated-credentials/" rel="noopener noreferrer"&gt;Delegated Credentials&lt;/a&gt;&lt;/p&gt;

</description>
      <category>delegatedcredentials</category>
      <category>security</category>
    </item>
  </channel>
</rss>
