SSL Certificate Validity Reduced to 47 Days After Apple Proposal (securityonline.info)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 14 Apr 12:21
https://sh.itjust.works/post/36094548

#cybersecurity

threaded - newest

Australis13@fedia.io on 14 Apr 12:35 next collapse

Ouch, that's going to hurt. I completely understand why, but still...

drspod@lemmy.ml on 14 Apr 12:41 next collapse

There is an arguably much worse security issue which could potentially be caused by this change: If users become more likely to encounter expired certificate warnings, then they are more likely to have to click through those warnings and develop warning-fatigue, making them more vulnerable to accepting invalid certificates during an actual attack on their system.

It will be interesting to see whether CAs are capable of increasing their capacity by the 10x necessary just to serve the same number of customers. Presumably they will need to raise prices to accomplish this. Outages with certificate renewal systems will be almost inevitable - it’s only a question of how frequently we see it.

cron@feddit.org on 14 Apr 13:26 next collapse

Letsencrypt already renews all of their certificates every 60 days. Not much will change for the largest CA.

And as most admins are getting used to free certificates, paying for certs will become even less a thing.

lily33@lemm.ee on 14 Apr 14:00 next collapse

They’re already also offering 6-day certs, so capacity isn’t a problem.

gezero_tech@lemmy.bowyerhub.uk on 15 Apr 02:51 collapse

Let’s see what the reduced funding from US gov will do.

bamboo@lemmy.blahaj.zone on 14 Apr 14:51 collapse

This isn’t an overnight change, we have 3 years until the 47 day certificates go into effect.

In terms of increasing their capacity by the 10x, having shorter certificate lifetimes means that CAs will have a shorter list of valid but revoked certificates, and also will have way less of valid certificates in the certificate transparency logs. These are checked constantly, so the reduced size means less costs serving this information.

CAs are already charging an arm and a leg for very little work of signing the certificates. Doing domain validation is an automated process, so unless the need is for OV certificates (which doesn’t differentiate you anymore in modern browsers), CAs won’t need to hire more people for issuing certificates. With Let’s Encrypt being a free option that supports ACME, if CAs use this change as a cash grab, they’ll probably see clients move away rather than put up with the outrageous costs.

lnxtx@feddit.nl on 14 Apr 12:44 next collapse

But price will be the same (47/365), right? Right…?

cron@feddit.org on 14 Apr 13:01 collapse

I think manual ordering of certificates will come to an end.

FMT99@lemmy.world on 14 Apr 13:10 collapse

I just kicked the last of our manually requested certs off our servers and replaced them with auto renewing short term certs. Replacing certs every year is a job I won’t miss.

cron@feddit.org on 14 Apr 13:03 collapse

The relevant timeline from the article:

Phased Implementation Timeline:

  • Until March 14, 2026: Maximum validity remains 398 days
  • Until March 14, 2027: Validity shortened to 200 days
  • Until March 14, 2028: Validity shortened to 100 days
  • From March 15, 2028 onward: Maximum validity reduced to 47 days