Where can I find the most up to date SSL certificates for the USP MTP layer?
The CDRouter USP (TR-369) expansion includes a “server” certificate file which
can be used for SSL/TLS testing. The certificate is distributed in .pem
format and is located in the /usr/cdrouter/tests
directory on the CDRouter
host system.
Sectigo/Comodo Signed Server Certificates
The current USP “server” certificate may be used for both the MTP (Message Transport Protocol) layer and the USP record layer.
For the MTP layer, it will be used for which ever method is configured: WebSockets, STOMP, or MQTT.
Sectigo Root CA
The “server” certificate is signed by a Sectigo (formerly Comodo) Root CA. Your USP agent should hopefully have this Root CA already installed in its certificate store, but if it does not, we have also included it on your CDRouter system. You would need to manually copy it to the device where your TR-369 (USP) agent is located.
For more information on the Sectigo Chain Hierarchy and Intermediate Roots, please see this page.
Current USP controller certificates
The USP controller certificate used in CDRouter is valid for one year and expires every year in January or early February.
Updated controller certificates will be included in new versions of CDRouter
when available. If you are using an older version of CDRouter with expired
certificates, you may download the current valid certificates below and copy
them to the /usr/cdrouter/tests
directory on your CDRouter system.
Certificate Type | Signature Algorithm | File | Expiration Date |
---|---|---|---|
USP “server” certificate | ecdsa (SHA256) | wildcard.cdroutertest.com.pem | January 23, 2026 |
Intermediate CAs (2) | ecdsa (SHA384) | wildcard.cdroutertest.com-ca.pem | December 31, 2030 |
Root CA | rsa (SHA1) | wildcard.cdroutertest.com-rootca.pem | December 31, 2028 |
Note: This certificate chain uses ECC encryption.
Certificate chain with SHA384 Root CA
Some devices may require using a Root CA with a more secure signature algorithm. For these devices an alternate chain using a Root CA with a SHA384 signature with ECC encryption is available in the following table:
Certificate Type | Signature Algorithm | File | Expiration Date |
---|---|---|---|
Intermediate CA | ecdsa (SHA384) | wildcard.cdroutertest.com-ca-sha384.pem | December 31, 2030 |
Root CA | ecdsa (SHA384) | wildcard.cdroutertest.com-rootca-sha384.pem | January 18, 2038 |
Note: In the above table, the full chain has a length of three (3). The Intermediate CA file contains a single Intermediate certificate.
Note: This chain uses the same USP “server” certificate that is in the product. Only the intermediate and root are different.