Comment on Decreasing Certificate Lifetimes to 45 Days
Prove_your_argument@piefed.social 4 days ago
Reducing the valid time will not solve the underlying problems they are trying to fix.
We’re just gonna see more and more mass outages over time especially if this reduces to an uncomfortably short duration. Imagine what might happen if a mass crowdflare/microsoft/amazon/google outage that goes on perhaps a week or two? what if the CAs we use go down longer than the expiration period?
Sure, the current goal is to move everybody over to ACME but now that’s yet another piece of software that has to be monitored, may have flaws or exploits, may not always run as expected… and has dozens of variations with dependencies and libraries that will have various levels of security of their own and potentially more vulnerabilities.
I don’t have the solution, I just don’t see this as fixing anything. What’s the replacement?
fistac0rpse@fedia.io 4 days ago
clearly the most secure option is to have certificates that are only valid for 30 seconds at a time
fxdave@lemmy.ml 4 days ago
Let’s be extra safe. New cert per every request
RheumatoidArthritis@mander.xyz 3 days ago
Ephemeral diffie-hellman is exactly that, it’s part of TLS since I think 1.2
nialv7@lemmy.world 3 days ago
Well it should be as short as possible while still being practical. LE doesn’t have infinite server compute and if they make the validity too short people might stop using them (pretty evident judging from sentiment here) move to other CAs and make what they do pointless.
45 days are still plenty of time yet people are already complaining. Does make me worry.