篩選依據: reissued certificates x 清除
compliance

Industry moves to 3072-bit key minimum RSA code signing certificates

Starting May 27, 2021, to comply with new industry standards for code signing certificates, DigiCert will make the following changes to our code signing certificate process.

  • Stop issuing 2048-bit key code signing certificates
  • Only issue 3072-bit key or stronger code signing certificates
  • Use 4096-bit key intermediate CA and root certificates to issue our code signing certificates.

See Appendix A in the Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates to learn more about these industry changes,

How do these changes affect my existing 2048-bit key certificates?

All existing 2048-bit key size code signing certificates issued before May 27, 2021, will remain active. You can continue to use these certificates to sign code until they expire.

What if I need 2048-bit key code signing certificates?

Take these actions, as needed, before May 27, 2021:

  • Order new 2048-bit key certificates
  • Renew expiring 2048-bit key certificates
  • Reissue 2048-bit key certificates

How do these changes affect my code signing certificate process starting May 27, 2021?

Reissues for code signing certificate

Starting May 27, 2021, all reissued code signing certificates will be:

  • 3072-bit key or stronger. See eTokens for EV code signing certificates and HSMs for EV code signing certificates below.
  • Automatically issued from new intermediate CA and root certificates. See New ICA and root certificates below.

New and renewed code signing certificates

Starting May 27, 2021, all new and renewed code signing certificates will be:

  • 3072-bit key or stronger. See eTokens for EV code signing certificates and HSMs for EV code signing certificates below.
  • Automatically issued from new intermediate CA and root certificates. See New ICA and root certificates below.

CSRs for code signing certificates

Starting May 27, 2021, you must use a 3072-bit RSA key or larger to generate all certificate signing requests (CSR). We will no longer accept 2048-bit key CSRs for code signing certificate requests.

eTokens for EV code signing certificates

Starting May 27, 2021, you must use an eToken that supports 3072-bit keys when you reissue, order, or renew an EV code signing certificate.

  • When you order or renew an EV code signing certificate, DigiCert includes a 3072-bit eToken with your purchase. DigiCert provides an eToken with the Preconfigured Hardware Token provisioning option.
  • When your reissue your EV code signing certificate reissues, you must provide your own 3072-bit eToken. If you don't have one, you will be unable to install your reissued certificate on your eToken.
  • You must have a FIPS 140-2 Level 2 or Common Criteria EAL4+ compliant device.

HSMs for EV code signing certificates

Starting May 27, 2021, you must use an HSM that supports 3072-bit keys. Contact your HSM vendor for more information.

New ICA and root certificates

Starting May 27, 2021, DigiCert will issue all new code signing certificates from our new RSA and ECC intermediate CA and root certificates (new, renewed, and reissued).

RSA ICA and root certificates:

  • DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
  • DigiCert Trusted Root G4

ECC ICA and root certificates:

  • DigiCert Global G3 Code Signing ECC SHA384 2021 CA1
  • DigiCert Global Root G3

No action is required unless you practice certificate pinning, hard code certificate acceptance, or operate a trust store.

If you do any of these things, we recommend updating your environment as soon as possible. Stop pinning and hard coding ICAs or make the necessary changes to ensure certificates issued from the new ICA certificates are trusted (in other words, they can chain up to their issuing ICA and trusted root certificates).

References

If you have questions or concerns, please contact your account manager or our support team.

compliance

DigiCert to stop issuing SHA-1 code signing certificates

On Tuesday, December 1, 2020 MST, DigiCert will stop issuing SHA-1 code signing and SHA-1 EV code signing certificates.

Note: All existing SHA-1 code signing/EV code signing certificates will remain active until they expire.

Why is DigiCert making these changes?

To comply with the new industry standards, certificate authorities (CAs) must make the following changes by January 1, 2021:

  • Stop issuing SHA-1 code signing certificates
  • Stop using SHA-1 intermediate CA and SHA-1 root certificates to issue SHA-256 algorithm code signing and timestamping certificates

See Appendix A in the Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates.

How do the SHA-1 code signing certificate changes affect me?

If you rely on SHA-1 code signing certificates, take these actions as needed before December 1, 2020:

  • Get your new SHA-1 certificates
  • Renew your SHA-1 certificates
  • Reissue and get needed SHA-1 certificates

For more information about the December 1, 2020 changes, see our knowledgebase article DigiCert to Stop Issuing SHA-1 Code Signing Certificates.

If you have additional questions, please contact your account manager or our support team.

enhancement

我們改良了「訂單的重新發行憑」頁面上的交易摘要,允許您查看到憑證到期剩下多少天。現在,當您重新發行憑證時,交易摘要會顯示憑證有效期限與直到到期的天數 (例如 1 年 (在 43 天到期)。

enhancement

在 DigiCert Services API 中,我們更新了列出訂單,訂單資訊,列出重新發行,和列出複本端點,讓您可以查看到憑證到期剩下多少天。關於些端點,我們在其回應中傳回 days_remaining 參數。

Example of the days_remaining response parameter.png

enhancement

我們改良我們的 Basic 和 Secure Site 單一網域憑證方案 (Standard SSL、EV SSL、Secure Site SSL 和 Secure Site EV SSL),新增在憑證中納入[your-domain].com 和 www.[your-domain].com 選項到這些憑證的訂單中、重新發行和重複的表格。此選項允許您選擇是否在這些單一網域憑證中,免費納入兩個版本的一般名稱 (FQDN)。

  • 若要保護兩個版本的一般名稱 (FQDN) 的安全,請勾選納入兩個[your-domain].com 和 www.[your-domain].com 到憑證中
  • 若只要保護一般名稱 (FQDN) 的安全,請取消勾選納入兩個[your-domain].com 和 www.[your-domain].com 到憑證中

請參閱訂購您的 SSL/TLS 憑證

也適用於子網域

新選項允許您取得兩個版本的基礎和子網域。現在,若要保護兩個版本的子網域的安全,請新增子網域到一般名稱方塊中 (sub.domain.com),然後勾選納入兩個[your-domain].com 和 www.[your-domain].com 到憑證中。當 DigiCert 發行您的憑證時,將納入憑證上兩個版本的子網域:[sub.domain].com 和 www.[sub.doman].com。

移除子網域的使用附加功能

在憑證中納入[your-domain].com 和 www.[your-domain].com 選項,使附加功能 -- 使用子網域的附加功能過時。因此,我們從「分區喜好設定」頁面移除選項 (在資訊看板功能表中,按一下設定 > 喜好設定)。

enhancement

在 DigiCert Services API 中,我們更新了 Order OV/EV SSL,訂購 SSL (type_hint),訂購 Secure Site SSL,訂購 Private SSL,重新發行憑證,和以下所列的重複的憑證端點。這些變更在要求、重新發行和複製您的單一網域憑證時提供更多控制權,允許您選擇是否在這些單一網域憑證上,免費納入特定的其他 SAN。

  • /ssl_plus
  • /ssl_ev_plus
  • /ssl_securesite
  • /ssl_ev_securesite
  • /private_ssl_plus
  • /ssl*
  • /reissue
  • /duplicate

*註:關於 Order SSL (type_hint) 端點,僅限使用如下述的 dns_names[] 參數來新增免費的 SAN。

保護您的兩個版本的網域的安全 ([your-domain].com 和 www.[your-domain].com),在您的要求中,使用 common_name 參數新增網域 ([your-domain].com) 和 dns_names[] 參數新增其他版本的網域 (www.[your-domain].com)。

當 DigiCert 發行您的憑證時,將保護您的兩個版本的網域的安全。

example SSL certificte request

若只要保護一般名稱 (FQDN) 的安全,只要從您的要求中省略 dns_names[] 參數。