▲ | xyzzy123 5 days ago | ||||||||||||||||||||||||||||||||||||||||
Can you point to a specific security problem this change is actually solving? For example, can we attribute any major security compromises in the last 5 years to TLS certificate lifetime? Are the security benefits really worth making anything with a valid TLS certificate stop working if it is air-gapped or offline for 48 days? > CAs and certificate consumers (browsers) voted in favour of this change. They didn't do this because they're incompetent but because they think it'll improve security. They're not incompetent and they're not "evil", and this change does improve some things. But the companies behind the top level CA ecosystem have their own interests which might not always align with those of end users. | |||||||||||||||||||||||||||||||||||||||||
▲ | dextercd 4 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
If a CA or subscriber improves their security but had an undetected incident in the past, a hacker today has a 397 day cert and can reuse the domain control validation in the next 397 days, meaning they can MITM traffic for effectively 794 days. CAs have now implemented MPIC. This may have thwarted some attacks, but those attackers still have valid certificates today and can request a new certificate without any domain control validation being performed in over a year. BGP hijackings have been uncovered in the last 5 years and MPIC does make this more difficult. https://en.wikipedia.org/wiki/BGP_hijacking New security standards should come into effect much faster. For fixes against attacks we know about today and new ones that are discovered and mitigated in the future. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
▲ | sidewndr46 5 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
According to the article: "The goal is to minimize risks from outdated certificate data, deprecated cryptographic algorithms, and prolonged exposure to compromised credentials. It also encourages companies and developers to utilize automation to renew and rotate TLS certificates, making it less likely that sites will be running on expired certificates." I'm not even sure what "outdated certificate data" could be. The browser by default won't negotiate a connection with an expired certificate | |||||||||||||||||||||||||||||||||||||||||
|