this post was submitted on 15 Apr 2025
130 points (97.8% liked)

Sysadmin

9230 readers
3 users here now

A community dedicated to the profession of IT Systems Administration

No generic Lemmy issue posts please! Posts about Lemmy belong in one of these communities:
!lemmy@lemmy.ml
!lemmyworld@lemmy.world
!lemmy_support@lemmy.ml
!support@lemmy.world

founded 2 years ago
MODERATORS
 

From today until March 15, 2026, the maximum lifetime for a TLS certificate is 398 days.

As of March 15, 2026, the maximum lifetime for a TLS certificate will be 200 days.

As of March 15, 2027, the maximum lifetime for a TLS certificate will be 100 days.

As of March 15, 2029, the maximum lifetime for a TLS certificate will be 47 days.

What's everyone's opinion on this? I think from a security standpoint their reasoning is valid and in many cases it's very easy to automate the renewal with ACME or something else. But there's likely gonna be legacy stuff still around in 2029 that won't be easy to automate.

all 35 comments
sorted by: hot top controversial new old
[–] enumerator4829@sh.itjust.works 67 points 1 month ago (3 children)

This will be so much fun for people with legacy systems

[–] mosiacmango@lemm.ee 34 points 1 month ago* (last edited 1 month ago) (2 children)

Self signed certs about to get even more popular.

[–] enumerator4829@sh.itjust.works 13 points 1 month ago

Tony Stark was able to build his CA in a cave! With a bunch of dice!

[–] SecureTaco@lemmy.asc6.org 4 points 1 month ago (1 children)

Self signed certs still have to abide. It’s the browser that checks it not the issuer. Now granted in most cases you already get a non trusted warning that most sysadmins skip…

[–] Zeoic@lemmy.world 5 points 1 month ago (2 children)

The cert is what tells the browser how long it lasts, so I'm not sure how the browser can stop you from using a 10 year self signed cert or one from your own CA

[–] catloaf@lemm.ee 3 points 1 month ago (1 children)

If the browser sees it expires too far in the future, it could throw a warning or error.

I doubt any of them will actually do it, but it's possible.

[–] prime_number_314159@lemmy.world 5 points 1 month ago

Most browsers do this for certs with a lifetime longer than 398 days issued after 2020, which is one aspect of why so many websites use a 1 year validity period for their certs.

[–] Valmond@lemmy.world 1 points 1 month ago

Or just spin up a new one all the time?

This way it will gradually ramp up the pain tho. If they went straight to 47 days, basically the entire internet would be gone for a few days.

[–] possiblylinux127@lemmy.zip 3 points 1 month ago

Self signed certs still support longer time frames

If you need to expose a legacy system to the internet we have bigger issues

[–] ptz@dubvee.org 38 points 1 month ago* (last edited 1 month ago) (4 children)

Are compromised private keys that much of a problem in the real world to merit such a pain in the ass, heavy handed "solution"? On paper, sure, it makes sense. In practice, you're forcing people to complicate the process by introducing, until now, unnecessary automation and introducing the possibility of brand new points of vulnerability.

I say this as someone who does maintain legacy systems (i.e. systems), so take it with a very angry, frazzled grain of salt. But I've done this for ~~years~~ decades and many, many systems and to my knowledge, I've never had a compromised private key.

This just seems like people who constantly lose their house keys mandating that everyone else change their locks as often as they do.

[–] bamboo@lemmy.blahaj.zone 10 points 1 month ago

One issue is that browsers and other clients have a difficult time handling certificate revocation. Let's Encrypt is stopping support for OCSP, and that had a lot of privacy implications where a CA could tell who is going to what site, based on the requests to check certificate revocation. Let's Encrypt is moving to CRLs, but the size of the CRL is very large the more certificates you have. For Let's Encrypt with only a 90 day validity period, their CRL is smaller than a CA which has certificates as much as 398 days old.

The size of the CRL is something not only CAs have to manage, on the client side, you may have to check a 10MB file to see if the certificate for the site you're connecting to is still trusted by the CA. With many CAs, these CRLs will take up a lot of space on disk, and need to be updated often. Mozilla published a system called CRLite which uses Cascading Bloom Filters to keep track of revoked certificates in the browser, which will save a lot of space. Having a constrained set of revoked certificates is useful to ensure the bloomfilter won't be too large for the browser to store and manage.

[–] kibiz0r@midwest.social 5 points 1 month ago

It’s not a problem… until it is.

And it has been before.

And probably will be again.

[–] WhyJiffie@sh.itjust.works 3 points 1 month ago

are you sure this mandates always using a new private key? I think I have read that they don't. how would you verify that anyway?

[–] JRaccoon@discuss.tchncs.de 2 points 1 month ago

I like that metaphor, I'm gonna save it. And agreed, there's going to be issues with legacy systems.

Luckily, at my current job, all of our outside-facing legacy services already go through an SSL terminating reverse proxy. And we then use self-signed certs with much longer validity for internal traffic where needed.

[–] pennomi@lemmy.world 11 points 1 month ago (2 children)

I can’t wait for the day when we have to refresh them hourly.

[–] SkaveRat@discuss.tchncs.de 11 points 1 month ago

ephemeral single use certs when?

[–] possiblylinux127@lemmy.zip 2 points 1 month ago

I think the main idea is to force automation

[–] Z3k3@lemmy.world 6 points 1 month ago (1 children)

My little corner of the business has started migrating our certs to let's encrypt.

Hope it catches on else where

[–] possiblylinux127@lemmy.zip 1 points 1 month ago (2 children)

I am a little concerned about the fact that Let's encrypt is a centralized service subject to outages. What would happen if they we either breached or had a several day issue.

If you are in the cloud you can use the cloud provided certs

[–] WhyJiffie@sh.itjust.works 2 points 1 month ago (1 children)

and I'm a little more concerned about the fact that Let's Encrypt has lost its funding recently

[–] Z3k3@lemmy.world 1 points 1 month ago

Out of the 2 scenarios this is the more immediate concern for me

[–] Z3k3@lemmy.world 1 points 1 month ago

This is always a concern however we were recently stung by the dicicert revocation thing. Spending a night changing thousands of certs was not fun

[–] 01189998819991197253 5 points 1 month ago

TLS? Noobs. All the cold kids just cleartext it.

[–] nazgul666@lemmy.world 4 points 1 month ago* (last edited 1 month ago) (2 children)

If I understand this correctly, it only affects certificates issued by public CAs (certificates for public websites, for example). So for certs issued by a company CA (e.g. for internal infrastructure), it should not apply. Can anyone confirm?

[–] ClemaX@lemm.ee 5 points 1 month ago

True. Technically the bounds for the validity period are from Jan 1, 1950 to Dec 31, 9999.

Source

[–] prime_number_314159@lemmy.world 2 points 1 month ago (1 children)

The browser warning appears even for a cert issued by a non public CA you have told your browser to trust, and most browsers already enforce a 398 day limit, so unless you have cooperative users, you're already (effectively) capped at 1 year of validity.

[–] lud@lemm.ee 2 points 1 month ago

No, that's fortunately not correct. TLS certificates issued by our CA are valid for 2 years and that works perfectly fine in all the browsers I have ever used.

[–] eddanja@lemmy.world 2 points 1 month ago (2 children)

Digicert is such a shitty CA.

[–] JRaccoon@discuss.tchncs.de 6 points 1 month ago (1 children)

Oh, I agree. This change will affect all CAs however. And their post seemed to contain the most amount of information.

[–] eddanja@lemmy.world 1 points 1 month ago

I just had to get it out of my system.

[–] possiblylinux127@lemmy.zip 2 points 1 month ago

"You can't use Let's encrypt in production!"

Me using let's encrypt for almost everything

[–] SkaveRat@discuss.tchncs.de 2 points 1 month ago

Doesn't really affet me much, as my LE cronjob will update the cert either way. Doesn't really matter if it's 90 days or 47 (what a weird number of days)

[–] reisub@discuss.tchncs.de 0 points 1 month ago

I like it. This action is inevitable in my opinion, and there will always be legacy systems regardless of the timeline, better start sooner than later.