1. Support Center
  2. SSL / TLS Vulnerabilities
  3. Vulnerabilities requiring reconfiguration

Renew TLS Certificates

The domain certificate is expired or will expire closely. An expired certificate will result in error messages for the web application's users.

Security Assessment

Security_Assessment_ RenewTLSCertificates

CVSS Vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

The domain certificate is expired or will expire very closely. An expired certificate will result in error messages for the web application's users. To guarantee secure connections between the users and the web server, request a newly signed certificate with your certificate authority.

Guides

Use one of the following guides to renew your certificates.

OpenSSL

To generate a certificate signing request for your certificate run:

openssl req -new -key ssl/certificate.key -out ssl/certificate_signing_request.csr

This assumes that your certificate to renew (including private key) is stored in ssl/certificate.key. Then submit thecertificate_signing_request.csr to your certificate authority. They will use this request to sign your certificate and provide you with the signed certificate. If the signed certificate is returned to you as new.crt, you can combine the key and the signed certificate as follows:

cp ssl/certificate.key ssl/new.pem
cat ssl/new.crt >> ssl/new.pem

The resulting new.pemfile can be copied to your webserver directory to be used in the web application.

Let's Encrypt

If you are using Let's Encrypt as your certificate authority, run the certbot renew command:

certbot renew

To enable manual renewal, add the renew command to your crontab by running Sudo crontab -e:

# m h   dom mon dow command
0 0 * * 0 certbot renew

This will run the renew command once a week at midnight trying to restore all your certificates.

For more information about Crashtest Security, visit crashtest-security.com.