Skip to content

Commit 2a31acd

Browse files
authored
Merge pull request #192153 from shlipsey3/ocsp-announcement
ocsp-announcement
2 parents 3393f9c + 332ee70 commit 2a31acd

File tree

2 files changed

+46
-0
lines changed

2 files changed

+46
-0
lines changed

articles/security/fundamentals/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,8 @@
136136
href: key-management.md
137137
- name: Double encryption
138138
href: double-encryption.md
139+
- name: Sunset for SHA-1 OCSP signing
140+
href: ocsp-sha-1-sunset.md
139141
- name: TLS certificate changes
140142
href: tls-certificate-changes.md
141143
- name: Disk encryption
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: Sunset for SHA-1 Online Certificate Standard Protocol signing
3+
description: Important information regarding changes to the OCSP service.
4+
5+
services: azure
6+
ms.service: security
7+
ms.subservice: security-fundamentals
8+
ms.topic: article
9+
ms.date: 03/17/2022
10+
11+
ms.author: sarahlipsey
12+
author: shlipsey3
13+
manager: rachelkarlin
14+
ms.reviewer: quentinb
15+
---
16+
# Sunset for SHA-1 Online Certificate Standard Protocol signing
17+
18+
Microsoft is updating the Online Certificate Standard Protocol (OCSP) service to comply with a recent change to the [Certificate Authority / Browser Forum (CA/B Forum)](https://cabforum.org/) Baseline Requirements. This change requires that all publicly-trusted Public Key Infrastructures (PKIs) end usage of the SHA-1 hash algorithms for OCSP responses by May 31, 2022.
19+
20+
Microsoft leverages certificates from multiple PKIs to secure its services. Many of those certificates already use OCSP responses that use the SHA-256 hash algorithm. This change brings all remaining PKIs used by Microsoft into compliance with this new requirement.
21+
22+
## When will this change happen?
23+
24+
Starting on March 28, 2022, Microsoft will begin updating its remaining OCSP Responders that use the SHA-1 hash algorithm to use the SHA-256 hash algorithm. By May 30, 2022, all OCSP responses for certificates used by Microsoft services will use the SHA-256 hash algorithm.
25+
26+
## What is the scope of the change?
27+
28+
This change impacts OCSP-based revocation for the Microsoft operated PKIs that were using SHA-1 hashing algorithms. All OCSP responses will use the SHA-256 hashing algorithm. The change only impacts OCSP responses, not the certificates themselves.
29+
30+
## Why is this change happening?
31+
32+
The [Certificate Authority / Browser Forum (CA/B Forum)](https://cabforum.org/) created this requirement from [ballot measure SC53](https://cabforum.org/2022/01/26/ballot-sc53-sunset-for-sha-1-ocsp-signing/). Microsoft is updating its configuration to remain in line with the updated [Baseline Requirement](https://cabforum.org/baseline-requirements-documents/).
33+
34+
## Will this change affect me?
35+
36+
Most customers won't be impacted. However, some older client configurations that don't support SHA-256 could experience a certificate validation error.
37+
38+
After May 31, 2022, clients that don't support SHA-256 hashes will be unable to validate the revocation status of a certificate, which could result in a failure in the client, depending on the configuration.
39+
40+
If you're unable to update your legacy client to one that supports SHA-256, you can disable revocation checking to bypass OCSP until you update your client. If your Transport Layer Security (TLS) stack is older than 2015, you should review your configuration for potential incompatibilities.
41+
42+
## Next steps
43+
44+
If you have questions, contact us through [support](https://azure.microsoft.com/support/options/).

0 commit comments

Comments
 (0)