Service Status

This page provides status information on the services that are part of Swisscom Trust Servcies. Check back here to view the current status of the services listed below, or subscribe to an RSS feed to be notified of interruptions to each individual service. If you are experiencing an issue not listed here, please contact support.

Subscribe to the RSS-Feed.

Signing Service

At the moment no technical difficulties are known.

Smart Registration Service

At the moment no technical difficulties are known.

Mobile ID

At the moment no technical difficulties are known.

Update terms of use Signing Service

10. - 26. May 2021

We would like to inform you that the terms of use for our Signing Service are being updated. From 11th of May 2021, every user will receive the information about these updates via SMS Message (Sender: +41 58 221 74 23). You can also find the changes of the terms of use under the following links:

and a brief manual here.

The user has 15 days to accept the new terms of use. For this purpose, the user will receive a maximum of five reminder-SMS messages at three-day intervals. Only the most recent SMS is valid and must be used by the user. If the terms of use are not accepted, despite the reminder SMS, you can no longer use the signing service.

Maintenance work RA Service

04. May 2021

Due to maintenance work on 4.05.2021 between 9.00 and 10.00 PM the RA Service will only be available to a limited extent. During this timeslot signing requests can lead to errors for a short period of time. We recommend you to try signing again a few minutes later.

 

Maintenance window Smart Registration Service

13. April 2021

Due to maintenance work on 13th April between 7:00 and 8:00, the Smart Registration Service's availability may be temporarily restricted.

Technical News on our Servcies

  • Signing Service
  • Smart Registration Service
  • Mobile ID
  • Certificates

Technical updates - Signing Service

New Terms Of Use for the Selected Signing Service offered by Partner Cryptomathic

24. March 2021, EU and Switzerland

Changes tot he Terms of Use «Selected Signing Service», March 24th, 2021:

Swisscom has added information in section 2.3 what happens in case of a longterm certificate if the crytological protection is no longer sufficient due to the progress in technology:

Should Swisscom have to revoke the signature certificate due to insufficient algorithms, the applicant for this certificate will be informed and receive an offer for a new certificate with sufficient cryptological protection.

 

Links:

Terms Of Use Swiss ZertES:

DE: https://documents.swisscom.com/product/filestore/lib/7b68e8b7-c583-4d82-ad1e-433bd5b204b7/termsofuse_sss_ch-de.pdf?idxme=pex-search

EN: https://documents.swisscom.com/product/filestore/lib/7b68e8b7-c583-4d82-ad1e-433bd5b204b7/termsofuse_sss_ch-de.pdf?idxme=pex-search

FR: https://documents.swisscom.com/product/filestore/lib/ca5af0ae-8f17-422f-a648-ae8c78f10e39/termsofuse_sss_ch-fr.pdf?idxme=pex-search

IT: https://documents.swisscom.com/product/filestore/lib/e39a0dfa-27e2-47c2-a3c1-6f989a547e09/termsofuse_sss_ch-it.pdf?idxme=pex-search

Terms Of Use EU eIDAS:

DE: https://documents.swisscom.com/product/filestore/lib/eae917fa-e825-4689-9e17-16dced5778e3/termsofuse_sss_eu-de.pdf?idxme=pex-search

EN: https://documents.swisscom.com/product/filestore/lib/e390e71f-400c-49c1-8841-9c573b4aae34/termsofuse_sss_eu-en.pdf?idxme=pex-search

validator.ch struggles with new cryptoalgorithms

22. March 2021, Switzerland

As we heard from the national validator.ch team the current validator release has problems facing the new cryptoalgorithms which are required legally since end of 2018 and must be changed till end of this year. SHA512 signatures do not work (everything is "red") and reduction to SHA256 at least show warnings. The team already prepared a new version but it will be installed in June 2021 as we heard. Thus after switch to CA4 you could face problems with the validator.ch.

We have asked the federal government about dealing with this problem and will continue to report on answers here. At present we only know that a new release of the validator is in the test and accepts the CA4 signatures. We are expecting this new release in the middle of the year.

Start Switch to CA4

22. March 2021, worldwide

You will be now contacted in the next days concerning the switch to the new CA4 root certificate service for ZertES/Switzerland. Till end of the year you have time to switch your account to the new service.

Technical updates - Smart Registration Service

Registration Service: Mobile ID App is now available in all EU stores

06. November 2020, EU

The Mobile ID App is now in all European play stores and iOS app stores available!

Maintenance on Okt. 14th between 4:00 and 5:00 AM

09. October 2020

Due to maintenance work on the messaging services on Oct. 14th between 4:00 and 5:00 AM, the service will be temporarilly unavailable.

SRS, RA-Service, Docusign: Adaptation of the TLS connections

29. October 2020, worldwide

Company Swisscom will change its TLS protocols and will no longer support unsecure TLS protocol versions and cryptographic processes. The change will take place on Oct. 29th, 2020 at 10pm. The following will change:

  1. No longer support of TLS Version 1.0
  2. No longer support of TLS Version 1.1
  3. No longer support of following TLS-Version 1.2-Cryptography:
  • AES256-GCM-SHA384
  • AES256-SHA256
  • AES256-SHA
  • AES128-GCM-SHA256
  • AES128-SHA256
  • AES128-SHA

Please check your TLS connections to us! This is the new configuration with the remaining supported chiffres after the change:

 

SUITE BITS PROT CIPHER MAC KEYX
ECDHE-RSA-AES256-GCM-SHA384 256 TLS1.2 AES-GCM SHA384 ECDHE_RSA
ECDHE-RSA-AES256-SHA384 256 TLS1.2 AES SHA384 ECDHE_RSA
ECDHE-RSA-AES256-CBC-SHA 256 TLS1.2 AES SHA ECDHE_RSA
ECDHE-RSA-AES128-GCM-SHA256 128 TLS1.2 AES-GCM SHA256 ECDHE_RSA
ECDHE-RSA-AES128-SHA256 128 TLS1.2 AES SHA256 ECDHE_RSA
ECDHE-RSA-AES128-CBC-SHA 128 TLS1.2 AES SHA ECDHE_RSA

Der Vollständigkeit nach ist dies die aktuelle Liste der Verschlüsselungssammlungen, die mit dem entsprechenden Protokoll aktiviert sind:

 

SUITE BITS PROT CIPHER MAC KEYX
ECDHE-RSA-AES256-GCM-SHA384 256 TLS1.2 AES-GCM SHA384 ECDHE_RSA
ECDHE-RSA-AES256-SHA384 256 TLS1.2 AES SHA384 ECDHE_RSA
ECDHE-RSA-AES256-CBC-SHA 256 TLS1 AES SHA ECDHE_RSA
ECDHE-RSA-AES256-CBC-SHA 256 TLS1.1 AES SHA ECDHE_RSA
ECDHE-RSA-AES256-CBC-SHA 256 TLS1.2 AES SHA ECDHE_RSA
AES256-GCM-SHA384 256 TLS1.2 AES-GCM SHA384 RSA
AES256-SHA256 256 TLS1.2 AES SHA256 RSA
AES256-SHA 256 TLS1 AES SHA RSA
AES256-SHA 256 TLS1.1 AES SHA RSA
AES256-SHA 256 TLS1.2 AES SHA RSA
AES256-SHA 256 DTLS1 AES SHA RSA
ECDHE-RSA-AES128-GCM-SHA256 128 TLS1.2 AES-GCM SHA256 ECDHE_RSA
ECDHE-RSA-AES128-SHA256 128 TLS1.2 AES SHA256 ECDHE_RSA
ECDHE-RSA-AES128-CBC-SHA 128 TLS1 AES SHA ECDHE_RSA
ECDHE-RSA-AES128-CBC-SHA 128 TLS1.1 AES SHA ECDHE_RSA
ECDHE-RSA-AES128-CBC-SHA 128 TLS1.2 AES SHA ECDHE_RSA
AES128-GCM-SHA256 128 TLS1.2 AES-GCM SHA256 RSA
AES128-SHA256 128 TLS1.2 AES SHA256 RSA
AES128-SHA 128 TLS1 AES SHA RSA
AES128-SHA 128 TLS1.1 AES SHA RSA
AES128-SHA 128 TLS1.2 AES SHA RSA
AES128-SHA 128 DTLS1 AES

 

 

Thes suites will be removed:

 

SUITE BITS PROT CIPHER MAC KEYX
ECDHE-RSA-AES256-CBC-SHA 256 TLS1 AES SHA ECDHE_RSA
ECDHE-RSA-AES256-CBC-SHA 256 TLS1.1 AES SHA ECDHE_RSA
AES256-GCM-SHA384 256 TLS1.2 AES-GCM SHA384 RSA
AES256-SHA256 256 TLS1.2 AES SHA256 RSA
AES256-SHA 256 TLS1 AES SHA RSA
AES256-SHA 256 TLS1.1 AES SHA RSA
AES256-SHA 256 TLS1.2 AES SHA RSA
AES256-SHA 256 DTLS1 AES SHA RSA
ECDHE-RSA-AES128-CBC-SHA 128 TLS1 AES SHA ECDHE_RSA
ECDHE-RSA-AES128-CBC-SHA 128 TLS1.1 AES SHA ECDHE_RSA
AES128-GCM-SHA256 128 TLS1.2 AES-GCM SHA256 RSA
AES128-SHA256 128 TLS1.2 AES SHA256 RSA
AES128-SHA 128 TLS1 AES SHA RSA
AES128-SHA 128 TLS1.1 AES SHA RSA
AES128-SHA 128 TLS1.2 AES SHA RSA
AES128-SHA 128 DTLS1 AES

Technical updates - Mobile ID

No updates available

CA4: Update of application documentation

16. April 2021

During the vetting  due to the new activation of the new parallel accesses for teh seal based on the new root certificate CA4, we noticed that the application documents, which were previously available to us to issue a new seal certificate, are not sufficient or partly no longer valid (e.g. identity cards of the applicants) for some small number of our customers. The access of these customers to the new account will therefore be delayed until the necessary application documents are available in accordance with our regulatory regulations. They will be contacted by  our Sales Support. Up to the activation of the new CA4 seal they could use their current seal.

Swisscom Timestamp now Qualified for eIDAS

23. December 2020, worldwide

The regulatory supervisory body RTR in Austria informed us today that the Telekom Control Commission has decided that Swisscom can also offer the time stamp as qualified for eIDAS.

NEW: The qualified timestamp is now published in the eIDAS trust list officially.

New CA4 in October

15. February 2021, Switzerland

The new CA4

The new rules and regulations require certification service providers and trust service providers to use better algorithms to ensure the trustworthiness of signatures in the future. Swisscom will first replace the root certificate authority instance (CA) for Switzerland (CH jurisdiction) and later also for the EU (eIDAS jurisdiction), thereby adapting the entire certificate chain and providing for the new algorithms. This concern, on the one hand, the so-called "padding algorithm" which will switch from currently SASSA-PKCS1 v1_5 to RSASSA-PSS, and on the other hand the key length, which will be increased from 2048 to 3072.

What are the implications?

  • The size of the signature in the signed document changes, i.e. the signature takes up more space. Since signature applications make estimates to the best of their knowledge of how much space a signature requires, it may be that this estimate is no longer correct and therefore a signature is no longer possible.
  • If you use standard applications that display trusted signatures, such as Adobe Reader, the latter will continue to trust the signatures. However, if you have special applications that first require the root certificate of the certificate chain for trustworthiness, you must reinstall it.

When will the changes take effect?

We are planning a changeover in quarter I/II 2021. In addition to the existing account ("ClaimedID") we will issue a new ClaimedID based on the new certificate chain to customers. After 2-3 months we will switch off the old ClaimedIDs. In this respect, it is possible to test and switch individually during this period of time.

What do you need to do?

If you are the developer of the signature application you are using, you should observe the notes on the development information page https://github.com/SCS-CBU-CED-IAM/AIS/wiki/Swisscom-CA-4 . Otherwise, you should inform the partner which provided you with the signature application. At the same time, however, we will also inform all our partners.

We will inform you with further details in February 2021.