• Solutions
    • FERC XBRL Reporting
    • FDTA Financial Reporting
    • SEC Compliance
    • Windows Clipboard Management
    • Legato Scripting
  • Products
    • GoFiler Suite
    • XBRLworks
    • SEC Exhibit Explorer
    • SEC Extractor
    • Clipboard Scout
    • Legato
  • Education
    • Training
    • SEC and EDGAR Compliance
    • Legato Developers
  • Blog
  • Support
  • Skip to blog entries
  • Skip to archive page
  • Skip to right sidebar

Friday, May 05. 2017

Use of SHA-1 SSL Certificates and Windows Server

Back in November of 2013, Microsoft released a Security Advisory stating that by January of 2016 Microsoft would no longer allow root authorities to issue certificates using the SHA-1 hashing algorithm. As that date has come and gone, most users probably never even noticed anything happening. This is because browsers were quick to adopt the new changes. E-commerce is part of everyday life and no one wants to buy something from a site that their browser says is insecure. However, SSL certificates are used for many other things, including verifying publishers of software and drivers. This is also known as code signing.


A screenshot of the Windows security prompt dialog boxIt’s now 2017 and many software publishers still use SHA-1 certificates for their code signing. For websites the change was simple: update the certificate or users would get security errors. For software, it is a little more complicated. Older operating systems like Windows XP, Windows Vista, and Windows Server 2008 do not support SHA256 code signing certificates. This meant changing the certificate may cause problems for users on older systems. To make matters worse, newer operating systems, like Windows 8.1 and Windows 10, do allow SHA-1 certificates but running them may generate extra security prompts for the user. This puts many software publishers on the spot since they are forced to either drop support for older operating systems or have extra security prompts. Applications can be signed with both types of certificates, but this still can cause additional security prompts as one of the certificates is still using SHA-1.


So what do this mean for end-users? Not too much except there may be many software providers who will be quick to drop support for older versions of Windows. This can already be seen as Firefox and Google Chrome have already limited their support of older versions. Here at Novaworks we will not actively support Vista and Windows Server 2008, but we will attempt to maintain compatibility as long as it is feasible. It is important to note that Server 2008 R2 does support SHA256 code signing certificates but does not properly display both certificates if an executable is dual signed.


To verify your version of Windows deals with the different certificates, we have a zip file (download link) that contains the same executable file signed with different certificates. The executable is a simple program that shows if the computer trusts the executable as well as the certificate hashing algorithm. The executable files require the .NET framework 3.5 or later to run.


What does a Code Signing Certificate do?


Much like a certificate for a website, a code signing certificate is issued by a trusted third party. That trusted third party verifies the software publisher to varying degrees based on the level of security requested. Since the trusted third party has verified the publisher the end user knows they can trust the publisher. Code signing certificates also offer another layer of protection for end users. The certificate also can show if the code was edited after it was signed. This means a virus or hacker can’t change software to do something else and still have it appear as a valid publisher.


 


Additional Resources

Microsoft Security Advisory 2880823 (technet.microsoft.com)

Windows Enforcement of SHA1 Certificates (technet.microsoft.com)



Posted by
The Novaworks Team
in Information Technology at 15:42
Trackbacks
Trackback specific URI for this entry

No Trackbacks

Comments
Display comments as (Linear | Threaded)
No comments
The author does not allow comments to this entry

Quicksearch

Categories

  • XML Accounting
  • XML AICPA News
  • XML FASB News
  • XML GASB News
  • XML IASB News
  • XML Development
  • XML Events
  • XML FERC
  • XML eForms News
  • XML FERC Filing Help
  • XML Filing Technology
  • XML Information Technology
  • XML Investor Education
  • XML MSRB
  • XML EMMA News
  • XML FDTA
  • XML MSRB Filing Help
  • XML Novaworks News
  • XML GoFiler Online Updates
  • XML GoFiler Updates
  • XML XBRLworks Updates
  • XML SEC
  • XML Corporation Finance
  • XML DERA
  • XML EDGAR News
  • XML Investment Management
  • XML SEC Filing Help
  • XML XBRL
  • XML Data Quality Committee
  • XML GRIP Taxonomy
  • XML IFRS Taxonomy
  • XML US GAAP Taxonomy

Calendar

Back May '25 Forward
Mo Tu We Th Fr Sa Su
Monday, May 12. 2025
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Feeds

  • XML
Sign Up Now
Get SEC news articles and blog posts delivered monthly to your inbox!
Based on the s9y Bulletproof template framework

Compliance

  • FERC
  • EDGAR
  • EMMA

Software

  • GoFiler Suite
  • SEC Exhibit Explorer
  • SEC Extractor
  • XBRLworks
  • Legato Scripting

Company

  • About Novaworks
  • News
  • Site Map
  • Support

Follow Us:

  • LinkedIn
  • YouTube
  • RSS
  • Newsletter
  • © 2024 Novaworks, LLC
  • Privacy
  • Terms of Use
  • Trademarks and Patents
  • Contact Us