▲ | woodruffw 3 days ago | |||||||||||||||||||||||||||||||||||||||||||
The "end game" is mentioned explicitly in the article: > Shorter lifetimes mitigate the effects of using potentially revoked certificates. In 2023, CA/B Forum took this philosophy to another level by approving short-lived certificates, which expire within 7 days, and which do not require CRL or OCSP support. Shorter-lived certificates make OCSP and other revocation mechanisms less of a load-bearing component within the Web PKI. This is a good thing, since neither CAs nor browsers have managed to make timely revocation methods scale well. (I don't think there's any monetary or power advantage to doing this. The reason to do it is because shorter lifetimes make it harder for server operators to normalize deviant certificate operation practices. The reasoning there is the same as with backups or any other period operational task: critical processes must be continually tested and evaluated for correctness.) | ||||||||||||||||||||||||||||||||||||||||||||
▲ | sitkack 3 days ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||
Don't lower cert times also get people to trust certs that were created just for their session to MITM them? That is the next step in nation state tapping of the internet. | ||||||||||||||||||||||||||||||||||||||||||||
|