Skip to main content
banner image
venafi logo

Symantec Certificate Security: What to Expect in 2018

Symantec Certificate Security: What to Expect in 2018

symantec security certificates
December 5, 2017 | Emil Hanscom

At the beginning of the year, many organizations were still in the process of moving away from vulnerable SHA-1 certificates. However, despite unsubtle warnings from browsers, detailed distrust schedules and high profile vulnerabilities, we saw prominent organizations still utilizing SHA-1 certificates surprisingly late in the year.

Now, we are facing another high-profile certificate distrust event, one that could be much more disruptive than SHA-1. The downgrading of trust for Symantec certificates will challenge many organizations – especially those who may not realize that some of their digital certificates chain up to Symantec roots.

The expected fallout from Symantec certificates is likely to parallel the SHA-1 scenario in many ways. As we pointed out before, Tom Henderson of Network World published an article regarding SHA-1 certificate failures on April 25th. According to Tom, when he attempted to access a website affiliated with the US government, he was greeted with a SHA-1 warning. This was well after the distrust deadline.

“My case in point is a website that explains the U.S. Safety Act,” wrote Tom. “The Act speaks to the practice of offering legal liability protection for products or services that have been certified for anti-terrorism protection. Any legitimate browser at the moment of this writing will block you from that site and warn you that the chain of authorities needed to vet the site as protected by SSL/TLS does not exist. The site is untrusted.”

Chrome researchers Devon O’Brien, Ryan Sleevi and Andrew Whalley have formally announced the browser’s plan to distrust Symantec’s certificates. The web leader has published a reasonable, but firm, distrust timeline that will hit aggressive milestones all throughout 2018. Other browsers will probably adhere to similar calendars next year.

Unfortunately, if SHA-1 is any indication, it’s highly likely organizations will continue to use distrusted Symantec certificates well after Chrome’s deadlines. Even with the publicity of their timeline.

Do you have the agility to replace your Symantec certificates or will your users get warnings like this?

Safari Warning Blur.png

Like this blog? We think you will love this.
TCP fast open and TLS handshake
Featured Blog

Does TCP Fast Open Improve TLS handshakes?

What is TCP Fast Open?

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more