Short-Lived Certificates Coming to Let’s Encrypt
Starting next year:
Our longstanding offering won’t fundamentally change next year, but we are going to introduce a new offering that’s a big shift from anything we’ve done before—short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.
Because we’ve done so much to encourage automation over the past decade, most of our subscribers aren’t going to have to do much in order to switch to shorter lived certificates. We, on the other hand, are going to have to think about the possibility that we will need to issue 20x as many certificates as we do now. It’s not inconceivable that at some point in our next decade we may need to be prepared to issue 100,000,000 certificates per day.
That sounds sort of nuts to me today, but issuing 5,000,000 certificates per day would have sounded crazy to me ten years ago.
This is an excellent idea.
Slashdot thread.
Subscribe to comments on this entry
Impossibly Stupid • December 16, 2024 11:58 AM
I’m not saying it’s entirely a bad feature to support, but it’d be nice to hear what makes it “an excellent idea”. To me it smacks too much of mandating frequent password changes. What’s the actual use case/attack scenario that makes rapid-fire cert hopping a significant protection of my server traffic? Are key compromise events really some huge problem that I’ve simply been unaware of?
The 6 day target seems like a bad choice, too. Maybe it’s more flexible and you can schedule the refresh (at 90 days, it was never so pressing a deadline that I had to fuss with the timing), but I foresee many instances of issues that arise when an expiration/refresh falls on the weekends. I get that they probably want to spread the load out on their servers a bit, but we all still have human oversight over our security systems, and I wonder how this will play out when it meets the 5 day work week.