Immediate action needed by site operators March 7, 2018

D

DelJo63

Chrome says:
We previously announced plans to deprecate Chrome’s trust in the Symantec certificate authority (including Symantec-owned brands like Thawte, VeriSign, Equifax, GeoTrust, and RapidSSL). This post outlines how site operators can determine if they’re affected by this deprecation, and if so, what needs to be done and by when. Failure to replace these certificates will result in site breakage in upcoming versions of major browsers, including Chrome.

Chrome 66
If your site is using a SSL/TLS certificate from Symantec that was issued before June 1, 2016, it will stop functioning in Chrome 66, which could already be impacting your users. If you are uncertain about whether your site is using such a certificate, you can preview these changes in Chrome Canary to see if your site is affected. If connecting to your site displays a certificate error or a warning in DevTools as shown below, you’ll need to replace your certificate. You can get a new certificate from any trusted CA, including Digicert, which recently acquired Symantec’s CA business.
 
Thanks for the friendly reminder. We're not impacted by the first wave of bad SSL certs, but by Chrome 70 (July-October) we should have replaced our main SSL certificate, which we plan to do in the coming month at the latest :)

Kudos to Let's Encrypt that now offer wildcard certs, that's what we plan to use moving forward across the board:
https://letsencrypt.org
 
Back