Security 101 05-22-2015

How to Fix “Site Is Using Outdated Security Settings” on Server

Flavio Martins

Recent efforts by browsers urge administrators to update SSL security on websites. This includes a big push to upgrade legacy SHA-1 certificates to SHA-256. Staying up-to-date is critical for ongoing data security issues and keeping online trust.

The Chrome browser led the way in how browsers are choosing to handle SHA-1 Certificates, and customers and users on some sites secured by have reported that they are getting an error that reads, “This site is using outdated security settings that may prevent future versions of Chrome from being able to safely access it."

The problem is related to a locally installed legacy intermediate certificate that is no longer used orrequired for the certificate installation. The problem can affect any client platform with a locally cached or installed intermediate certificate.

Legacy Intermediate Certificate

The certificate in question is the “ High Assurance EV Root CA” certificate. This temporary intermediate certificate was used in years past as part of a compatibility chain for older devices. This certificate is unnecessary for installations.

Error

The certificate chain for this website contains at least one certificate that was signed using a deprecated signature algorithm based on SHA-1.



One of the reasons this error will appear is if there is a cross-signed SHA-1 intermediate certificate in your certificate chain.

Is the Error on the Server or Browser Side?

To determine where the error is occurring, use SSL Installation Diagnostic Tool. Type in the name of your server and click “Check Server.” If a cross-signed intermediate certificate shows up in the certificate chain then the problem is on the server side. If there is no intermediate certificate in the chain, then the problem is on the browser side. To fix the error on the browser, side click .

Instructions for Fixing the Error on the Server Side

How to Remove the Cross-signed Intermediate Certificate for Windows How to Remove the Cross-signed Intermediate Certificate for Apache and Nginx

How to Remove the Cross-Signed Intermediate Certificate for Windows

To fix the error, you need to remove the cross-signed intermediate certificate so it does not bridge over to another Certificate Authority’s root certificate.

These instructions were created on Windows Server 2012. You may need to modify these instructions depending on which version of theoperating system you are using.

    1. Open Microsoft Management Console as an admin.

      1. On the Windows Start screen, type mmc.
      2. Right-click on mmc.exe and then click Run as administrator.
      3. In the User Account Control window, click Yes to allow the program to make changes to the computer.
    2. In the MMC Console, click File > Add/Remove Snap-in.
    3. In the Add or Remove Snap-ins window, under Available snap-ins, select Certificatesand then click Add.

    4. In the Certificate snap-in window, select Computer account so you can manage the certificates that are installed on this computer.

    5. In the Select Computer window, select Local computer: (the computer this console is running on) and click Finish.

    6. In the Add or Remove Snap-ins window, click OK.

    7. In the MMC Console tree, expand Intermediate Certification Authorities;click on the Certificates.

    8. Find the file under the Issued To section titled " High Assurance EV Root CA" and Issued By "Baltimore CyberTrust Root."

    9. Right-click on the "Baltimore CyberTrust Root" and click Delete.
    10. Restart the server.

How to Remove the Cross-signed Intermediate Certificate for Apache and Nginx

Apache

Edit theSSLCertificateChainFile /path/to/CA.crt directive to include only one certificate.

Nginx

Edit the ssl_certificate /etc/ssl/your_domain_name.pem; to include only the server certificate and its issuing intermediate certificate.

No Action Required for Most Certificate Installations

All recent installations of certificates issued by include the most up-to-date intermediates in order to establish trust with browsers.

If you have problems on other operating systems, so we can get additional details and update our documentation for other users to resolve the cached intermediate error.

If you need assistance with this or any other issues, is always happy to help.

UP NEXT
PKI

3 Surprising Uses of PKI in Big Companies and How to Ensure They Are all Secure

5 Min

Featured Stories

07-03-2024

What is a CA’s Role in delivering digital trust?

11-11-2024

FIPS 140-3 certification unlocked for TrustCore SDK

10-31-2024

Announcing the GA release of Device Trust Manager