SSL certificates working with the root certificate belonging to Sectigo, which is a certificate authority organization in SSL, have stopped working as of May 30, 2020 due to the expiration of the root certificate’s validity, despite their own periods continuing.
This problem is a problem that only concerns SSL certificates older than one year, and many large websites across the country and around the world have experienced SSL problems due to the root certificate not being updated in time.
First, we will write what you need to do to identify if you are experiencing such a problem, and then share the root certificates required to fix the problem with you;
Method 1:
https://www.sslshopper.com/ssl-checker.html
Enter your full URL starting with https to the certificate checker offered for free by SSL Shopper,
Common name: COMODO RSA Certification Authority
Organization: COMODO CA Limited
Location: Salford, Greater Manchester, GB
Valid from May 30, 2000 to May 30, 2020
Serial Number: 2766ee56eb49f38eabd770a2fc84de22
Signature Algorithm: sha384WithRSAEncryption
Issuer: AddTrust External CA Root
If you see the RSA certification authority key with a validation date of May 30, 2020 as we specified in the Chain sections, you need to update your root certificate.
Method 2:
https://www.ssllabs.com/ssltest/
SSL Labs is another certificate checker developed by Qualys that provides much more in-depth analysis on SSL. Enter your full URL starting with https in the Hostname field; since tests will be conducted over more than one TLS protocol, the page may take time to load,
Under the Additional Certificates (if supplied) heading, if you see the RSA certification authority key with “Valid until” date marked in red and showing May 30, 2020, you need to update your root certificate.
Solution:
To change the expired root certificate, follow the link below;
https://support.sectigo.com/Com_KnowledgeDetailPage?Id=kA01N000000rfBO
If you are using EV ssl and need to create a bundle CRT (Certificate file), the certificates in the file in order should be as follows;
Domain certificate key,
Sectigo RSA Extended Validation Secure Server CA
Sectigo RSA EV Bundle
If you are using Wildcard SSL and need to create a bundle CRT (Certificate file), the certificates in the file in order should be as follows;
Domain certificate key,
Sectigo RSA Domain Validation Secure Server CA
Sectigo RSA DV Bundle
If you are only using SSL related to a single domain name and need to create a bundle CRT (Certificate file), the certificates in the file in order should be as follows;
Domain certificate key,
Sectigo RSA DV Bundle
Sincerely.
Leave a Comment
* Your comment will be published after approval.
Comments
0No comments yet. Be the first to comment!