Sep 17, 2024
The Certificate Authority (CA) industry was alerted of compliance implications related to the inclusion of a specific extension (OCSP-signing extended key usage) in CA certificates which has, under certain conditions, unintended compliance and security implications. A number of GlobalSign Issuing CAs have been impacted by this issue. While no key compromise or security incident has taken place, we will be revoking these Issuing CA’s as part of our remediation plan in accordance with the CA/B Forum Baseline Requirements and the GlobalSign CPS. Revoked intermediate certificates can cause errors in the validation of certificates signed by these Intermediate Certificates.
To avoid any possible disruptions, please view the chart below to determine if you have Certificates that may be impacted and follow the Action Items/ Recommendations:
Using the Chart below determine if you have any Certificates (by product type) that may be impacted by the upcoming revocations. Then follow these 3 Steps:
Product Type |
Affected Certificates *Please see Step 1) for instructions on How to pull a list of impacted Certificates in your GCC Account |
Reissue Deadline - (Recommended) *Avoid disruptions and outages by reissuing and reinstalling at least 1 week prior to the revocation date (recommended dates below): |
Issuing CA Revocation Date | STEP 1) Search For Impacted Certificates |
STEP 2) Reissue Certificates Guide |
STEP 3) Install New Certificate |
---|---|---|---|---|---|---|
AATL – PDF / Document Signing |
AATL Certificates issued before: 14 Oct 2020 and expiring after 31 Dec 2020 |
24 Dec 2020 |
31 Dec 2020 NOTE: Revocation complete |
|
||
Domain Validated SSL (DV SSL) |
DV SSL issued before: 15 Aug 2020 and expiring after: 21 Jan 2021 |
14 Jan 2021 |
21 Jan 2021 NOTE: Revocation complete |
|
||
PersonalSign 1, 2, 2 Pro and 2 Department |
PersonalSign Certificates issued before: 12 Nov 2020 and expiring after 24 Feb 2021 |
17 Feb 2021 |
24 Feb 2021 |
|||
ePKI PersonalSign 2 PRO – NAESB Certificates |
ePKI Pro Certificate issued before: 28 Oct 2020 and expiring after 24 Feb 2021 |
17 Feb 2021 |
24 Feb 2021 |
|||
PersonalSign 3 Pro |
PersonalSign 3 Pro Certificates issued before: 10 December 2020 and expiring after: 24 Feb 2021 |
17 Feb 2021 | 24 Feb 2021 |
How to search for individual PersonalSign Orders Note: Belgian and Dutch residents will not have access to their own account to check impacted Certificates. Please r efer to step 2. |
For Belgian and Dutch Residents: Please make a manual request to support@globalsign.com, with a subject line formatted as "PersonalSign 3 Pro - Request for Reissue" If you are a resident of another country, you will have received credentials to your own GlobalSign account. You should be able to log in and use the following steps to reissue your Certificate: Reissue Client Digital Certificates |
|
NOTE: For customers, who need to install Certificate bundles, kindly check this link:
https://support.globalsign.com/ca-certificates/root-certificates/root-intermediate-certificate-bundles
For compliance reasons, GlobalSign had to discontinue use of a number of Intermediate Certificates (more specifically, Intermediate Certificate Authorities) to issue Certificates to customers. These discontinued Intermediate Certificates have to be revoked starting December 2020 through February 2021. See the specific deadlines in the chart above. Revocation of Intermediate Certificates can lead to complications with the validation of Digital Certificates, impacting their validity and intended functionalities.
The inclusion of a certain "Key Usage" extension (id-kp-OCSPSigning) would effectively allow an issuing CA to also act in the role of a delegated OCSP responder for the parent CA, which could be abused to manipulate the validity status of the issuing CA itself and the other issuing CA and Certificates that share the same parent.
No. No key compromise or security incident has taken place, the change is performed solely in the context of remediating a compliance issue and addressing any potential, unmaterialized security risk.
The following GlobalSign products are affected:
Specific Certificates that are impacted:
Once the revocation event takes place, Certificates cannot be guaranteed to function as intended and most likely will appear as invalid/ distrusted.
Important Note: Revocation dates can NOT be postponed, extended or delayed.
GlobalSign can no longer issue publicly trusted SSL/TLS Certificates with validity periods greater than 397 days due to changes in Apple and Google Root Store Policies, effective September 1, 2020.
When you reissue a prior 2-year TLS order after September 1, 2020, we are required to limit the validity to 397 days. You can reissue the Certificate again in the future (free of charge) to re-claim the original / remaining validity. For more information please view our Support Article here – specifically the FAQ titled:
- What happens when I reissue an existing 2-year TLS/SSL Certificate after this change goes into effect?
Your reissued Client Certificate (PersonalSign, Code Signing, AATL) will be automatically cancelled if it is not downloaded/ installed within 7 days - for Individual orders or 30 days for Enterprise PKI orders. To resolve this issue, you will need to locate the original order number and reissue the certificate again. Please download/ pick up the certificate within the recommended timeframe above to avoid the auto-cancelation in the future.
Check your certificate installation for SSL issues and vulnerabilities.