SSL notifications in Chrome and their meaning

This article is devoted to description of notifications appearing for SSL certificates in modern Chrome browsers (version 39+). Here is a list of the notifications we would like to expand on:

  1. Further, this page includes other resources which are not secure. These resources can be viewed by others while in transit, and can be modified by an attacker to change the look of the page.
  2. This site uses a weak security configuration (SHA-1 signatures), so your connection may not be private. <...> The certificate chain for this website contains at least one certificate that was signed using a deprecated signature algorithm based on SHA-1.
  3. Your connection to domain.com is encrypted using an obsolete cipher suit.
  4. No Certificate Transparency information was supplied by the server.

How to navigate to notifications in Chrome: click on the padlock >> Details.

chrnot1

You will see the notifications on the right side of your screen.

chrnot2

  1. The message “Further, this page includes other resources which are not secure. These resources can be viewed by others while in transit, and can be modified by an attacker to change the look of the page.” is often encountered after the SSL installation

    Notif_in_chrome_2.jpg

    This is caused by HTTP links in the HTML code of the webpage. It is possible to check links in the browser, just press the combination Ctrl+ Shift + J (or Command+Option+J for Mac) and click Console. More information on this matter can be found here.

  2. The warning “This site uses a weak security configuration (SHA-1 signatures), so your connection may not be private. <...> The certificate chain for this website contains at least one certificate that was signed using a deprecated signature algorithm based on SHA-1.” appears for all certificates with the SHA-1 signature algorithm

    chrnot3

    This issue is solved by the SSL certificate upgrade to SHA-256 with the help of a reissue process. The migration to the default SHA-256 with RSA signature algorithm for our certificates was performed on November 6, 2014.

  3. If you see the warning “Your connection to domain.com is encrypted using an obsolete cipher suit.”, your site is using a weak cipher suite or an SSL/TLS protocol to encrypt the traffic.

    Notif_in_chrome_4a.jpg

    The green padlock is shown despite this message. Still, to be on the safe side it is better to disable weak ciphers and protocols on the server (e.g. SSLv2, SSLv3, RC4, SHA1 or MD5 hashes used for message authentication). It is possible to scan your website for detecting which cypher or protocol causes the warning using this analyzer. The root access is required to change the server configurations for disabling the weak ciphers, so if you have none, please contact your hosting/server provider for assistance.

  4. The message “No Certificate Transparency information was supplied by the server.“ concerns the Certificate Transparency Project. In this case the green padlock is also displayed by Chrome.

    Notif_in_chrome_5a.jpg

    Certificate Transparency aims to monitor SSL certificates in real time, making issuance and use of fake SSLs almost impossible. The project should be implemented on the Certificate Authority side initially.

    All Comodo CA (now Sectigo CA) issued SSL certificates, since March 23, 2018, comply with Chromium's CT Policy, therefore customers who use Comodo (now Sectigo) certificates don't need to take any actions from their end to include certificates issued on or after such a date in any known CT Log to be compliant with Google Chrome mandate from April 2018.

The following links might also be useful for you:

Mixed Content in Mozilla

Certificate Transparency Project

Configuring Apache, Nginx, and OpenSSL for Forward Secrecy

Updated
Viewed
46892 times

Need help? We're always here for you.

notmyip