Security Blog

The latest news and insights from Google on security and safety on the Internet

Changes to our SSL Certificates

May 23, 2013
Share on Twitter Share on Facebook
Google

10 comments :

Chris Lockfort said...

With an apparent move to having a wide variety of CA vendors / leaf certs / etc, won't that make it harder for people to recognize when, for instance, a government forces a CA to issue valid certs for domains like gmail.com and intercepts what they presumed were private communications?

May 24, 2013 at 10:37 AM
Unknown said...

... and certainly you should use sha-256 instead of sha-1 in your certificates

May 27, 2013 at 6:37 AM
The IT Solutions People said...

I think it will be completely safe. Private key's are not something that a CA has or ever should have possession of so unless Google themselves provide their private key's willingly to government's all information remains private.

May 29, 2013 at 1:48 PM
The IT Solutions People said...

It is about time that Google moved to 2048 bit Roots and Keys. The continued use of the archaic Equifax Root signed hierarchy was a poor example to businesses and Enterprises on how to use SSL certificates to ensure the integrity of private and sensitive data and the legitimacy of the supposedly secured URL

SSL certificates are not used to protect Google themselves but the Public that interacts with Google, with the complete and unequivocal expectation that their Private and Sensitive data will remain just that.

Our core business principles are based on this message and this is the guidance that itsolutionspeople.com provide to its customers.

May 29, 2013 at 2:09 PM
April Joy said...

Is there a list of SSL compliant vendors out there?

June 19, 2013 at 3:12 PM
Unknown said...

To answer April Joy;
Symantec, GeoTrust, Thawte, Trustwave
http://goo.gl/RKaaVE

August 12, 2013 at 5:03 PM
pseudo nym said...

Even with the expansion to 2048 bit keys, if the entropy generating the primes P and Q used for the encryption is too low, there are still issues. See the great research done by the University of Michigan about "minding your Ps and Qs" - one start point here - https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs/

So Google...do you have sufficient entropy? That's the real question. 1024 bit keys would theoretically have enough primes that there would never be an issue of duplicate keys, but poor random number generation and insufficient entropy led to the Michigan folks compromising about a half a percent of public keys. That is vastly more than predicted...

August 23, 2013 at 1:10 PM
Unknown said...

When can we expect to see updated Google applications that support these recommendations?

At this time, Google Drive's PC application does not support SNI and performs some degree of certificate pinning for transfers.

September 30, 2013 at 10:14 AM
global protect said...

Multi-domain SSL certificates refer to a specific type of SSL certificate that offer security to multiple domain and hostnames that exist within the same domain. Multi-domain certificates are occasionally referred to as unified communications certificate (UCC), multi-SAN or UC certificate. This certificate is perfect for Exchange Server 2010, Microsoft Live Communications Software, and Microsoft Exchange Server 2007.

December 21, 2013 at 1:29 PM
Unknown said...

We all know what's wrong and don't care, how do we get a new certificate from Google?

May 10, 2014 at 7:57 AM

Post a Comment

  

Labels


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2024
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2023
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2022
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2021
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2020
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2019
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2018
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2017
    • Dec
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2016
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2015
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2014
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • Apr
    • Mar
    • Feb
    • Jan
  •     2013
    • Dec
    • Nov
    • Oct
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2012
    • Dec
    • Sep
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2011
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
  •     2010
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • May
    • Apr
    • Mar
  •     2009
    • Nov
    • Oct
    • Aug
    • Jul
    • Jun
    • Mar
  •     2008
    • Dec
    • Nov
    • Oct
    • Aug
    • Jul
    • May
    • Feb
  •     2007
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms
OSZAR »