Forum Discussion

Jigar_44119's avatar
Jigar_44119
Icon for Nimbostratus rankNimbostratus
Dec 16, 2015

sha1 - PCI issue - have to use sha256

one of the PCI requirement which just came up is to not use sha1 signature cert in F5 VIP. we have one big wildcard certificate which has been used to around 75 different VIPs which are production VIP.

 

now with the new requirement to use sha256.

 

can someone suggest me what is the step i need to follow to convert my wildcard certificate which right now use sha1 signature to start use of sha256

 

do I need to purchase another cert from ca? do I need to generate new cert, keys and refer to all those 75 production VIPs?

 

how much risk if I do this.

 

Thanks Dave

 

2 Replies

  • Hi Dave,

    start with a complete platform backup including the private keys, please.

    Now just create a new private key and a CSR using SHA256 and send let it sign by your CA.

    (It should even work to send your previous SHA1 based CSR and let it sign with a SHA256 hash by the CA.)

    Make sure to use a new objectname (no extension like .crt required) to avoid overwriting the existing key/cert data.

    Signing the new CSR should be free of charge in my opinion as as it is for the same CN and SANs and if is still valid.

    After receiving the new signed certificate and intermediate.ca file from your CA you will create a new client-ssl profile with the key/cert/chain and assign it step-by-step to your virtual servers.

    Before sending the CSR to your CA you can verify it locally in shell (
    cat
    will wait for you pasting the CSR text and pipe it to
    openssl
    which will decode it and generates some output):

    cat | openssl req -noout -text

    Now paste your CSR and it should return some data including the 'Signature Algorithm' showing sha256WithRSAEncryption. (As mentioned before, this is not mandatory for getting a SHA256 signed cert from your CA in my opinion.)

    Same procedure when receiving the signed cert. Paste it into the following:

    cat | openssl x509 -noout -text

    The output should also show a SHA256 signature.

    That´s it. Perhaps you have a test environment (i.e. BIG-IP Virtual Edition) to run all this offline before importing the key/cert pair to your production system.

    Thanks, Stephan
  • Stephen, Thanks for the reply. let me follow the steps. if I get any issue, I will post it here.