-
Notifications
You must be signed in to change notification settings - Fork 308
Update ssl cert to one signed with sha2 #3160
Comments
A closer reading of Google's blog post bears this out. |
The hash function is relevant when creating the CSR (include
|
P.S. I usually refer to https://devcenter.heroku.com/articles/ssl-endpoint when I have to do this. At some point we'll want a howto on IG. |
Looks like StartSSL wants me to revoke the previous certificate, which carries a $24.90 charge ... and a race condition. :-/ |
Revocation request submitted. |
And I emailed them about the race condition. |
It seems that StartSSL always uses a subdomain as the common name, adding the root as an alternate. The first subdomain added during the cert wizard becomes the common name, so to avoid revocation (which does carry the risk of downtime, in addition to the fee), they advised that I issue the certificate using a different subdomain as the common name. |
They cancelled the revocation request. I'm waiting for the cert to be issued (under |
Me:
|
I started the verification process. |
Extended validation reticketed as gratipay/inside.gratipay.com#144. Blocking this on that. |
Extended validation got bogged down and I abandoned the attempt. Now we're blocking on non-extended validation. :-) |
Looks like we're validated again at StartSSL. Now for the new cert ... |
Is there a reason we can't use the CSR from a few weeks ago? |
I submitted the CSR. |
I used |
Oops. We need a lot more alternate names, for all of our alternate domains. Current: Here's the list from Heroku for comparison:
We also need a separate cert for |
So ... two new CSRs. |
Boom! 🚀 Good look, @greggles. :-) |
Process documented: |
Now:
|
👍 |
CSRs submitted for CDN and widget server. |
Certs are in hand! |
I figured I'd configure DNS for alternate domains while I wait. I updated nameservers to DNSimple for all
|
At some point I turned off autorenew for |
Okay, |
I also removed the SPF record for |
To close this ticket I need to install the new CDN cert. I've reticketed widgets as gratipay/grtp.co#92. |
I was able to add a new cert, need to associate it with |
Cert installed for both subdomains and old cert deleted. Waiting for propagation ... |
Drat. Chrome is picking up the new cert but it's not green. :-( |
Skunked for tonight. Will revisit tomorrow ... |
Still skunked. I inspected the cert using Chrome for both of these: https://assets.gratipay.com/gratipay.svg I can't see a meaningful difference. |
Found it: https://shaaaaaaaaaaaaa.com/check/gratipay.com https://shaaaaaaaaaaaaa.com/check/assets.gratipay.com Looks like a tip to @konklone is in order. :-) |
https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1 |
Tips always accepted. ^_^ Nice job getting this all done. |
@konklone :-) |
I am getting an SSL error for gratipay.com on Chrome+Linux However, because of a bug in chrome, I don't know the root cause. The website opens fine, and there are no errors in the console. This is the kind of error that I'd expect from sha1 certs, but that seems to have been fixed. Will investigate further. |
@captn3m0 Can you be more specific about versions? I'm on Chrome+Linux, and it looks fine for me. Can you examine your browser trust store to see if StartCom's class 2 root is trusted at all? |
This is weird. I didn't even restart my browser, and now the cert is green. Version string is |
I don't know how Chrome updates itself, but I may guess that you could catch a moment when it updated resources, but didn't restarted the binary yet. |
The current ssl cert for gratipay.com is signed with sha1. It would be great to use a sha2 certificate, both because it is better for security and because Chrome is starting to warn users about sha1-signed certs which can decrease trust in the gratipay brand.
See http://googleonlinesecurity.blogspot.com/2014/09/gradually-sunsetting-sha-1.html for details on when/why they are doing this.
It *should * be a fairly straightforward change: get a new cert from the issuer and put it in place.
The text was updated successfully, but these errors were encountered: