Understanding the SSL Certificate Chain: Root and Intermediate Certificates
This article explains the details of the SSL certificate chain, including the difference between root and intermediate certificates and how they work together to secure your website. Understanding this hierarchy is key to diagnosing certain SSL/TLS issues.
In this article, we'll cover:
What are Root and Intermediate Certificates?
A 'root' certificate is a certificate that is self-signed (meaning its Subject and Issuer are the same) and is included by default in the trusted root store of operating systems and browsers. An 'intermediate' certificate acts as a bridge of trust between the root certificate and your server's SSL certificate, completing the SSL certificate chain.
There are three main root certificates commonly involved in these chains:
- AddTrust External CA Root:
https://crt.sh/?id=1
Uses sha1WithRSAEncryption. Expired in May of 2020. - USERTrust RSA CA:
https://crt.sh/?id=1199354
Uses sha384WithRSAEncryption. Expires in Jan 2038. - COMODO RSA CA:
https://crt.sh/?id=1720081
Uses sha384WithRSAEncryption. Expires in Jan 2038.
Because the newer SHA-2 roots (USERTrust, COMODO) haven't been trusted by all platforms for as long as the older AddTrust root, 'cross-certificates' were created. These are versions of the newer roots that were signed by the older, more widely trusted AddTrust root. For example, see the USERTrust RSA CA being signed by AddTrust: https://crt.sh/?id=4860286.
The AddTrust Root Expiration (May 2020)
Modern clients (browsers, operating systems) are unaffected by the AddTrust root's expiration. Their path-building logic simply ignores the expired cross-certificate and builds a valid SSL certificate chain directly to the newer, trusted SHA-2 root (COMODO or USERTrust) that is already in their trust store.
The only clients that could have problems were very old, end-of-life devices that trusted the AddTrust root but never received updates including the newer COMODO/USERTrust roots. For these legacy systems, the entire SSL certificate chain would fail validation after May 2020.
Visualizing the Trust Chain Paths
Below is a diagram showing the two potential trust paths. Certification path validation is done automatically on the client-side.
Trust Chain Path A (Legacy):
- AddTrust External CA Root [Root]
- USERTrust RSA Certification Authority [Intermediate 2]
- RSA DV/OV/EV Secure Server CA [Intermediate 1]
- End Entity [Your Website's Certificate]
Trust Chain Path B (Modern):
- USERTrust RSA Certification Authority (Root CA) [Root]
- RSA DV/OV/EV Secure Server CA [Intermediate 1]
- End Entity [Your Website's Certificate]
Related Links and Attachments
Related Intermediate Certificates:
- Intermediate Certificates - RSA
- Intermediate Certificates - ECC
- Changes to Comodo CA Issuing CAs - NEW branded issuing CAs
Attachments:
Review
This guide has detailed the structure of an SSL certificate chain, explaining the distinct roles of self-signed Root CAs and the Intermediate CAs that connect them to your website's SSL certificate. We also covered how the expiration of older roots like AddTrust was handled through cross-certificates and modern client logic, which automatically finds a valid trust path. Understanding this hierarchy helps clarify how browsers and devices validate the security of your website.