▲ | ori_b 3 days ago | ||||||||||||||||||||||||||||||||||||||||
Can someone point me to specific exploits that this key rotation schedule would have stopped? It seems to me like compromised keys are rare. It also seems like 47 days is low enough to be inconvenient, but not low enough to prevent significant numbers of people from being compromised if there is a compromised key. | |||||||||||||||||||||||||||||||||||||||||
▲ | Avamander 3 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
> Can someone point me to specific exploits that this key rotation schedule would have stopped? It's not only key mismanagement that is being mitigated. You also have to prove more frequently that you have control of the domain or IP in the certificate. In essence it brings a working method of revocation to WebPKI. > but not low enough to prevent significant numbers of people from being compromised if there is a compromised key. Compared to a year? | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
▲ | crote 3 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
The 47 days are (mostly) irrelevant when it comes to compromised keys. The certificate will be revoked by the CA at most 24 hours after compromise becomes known, so a shorter cert isn't really "more secure" than a longer one. At least, that's what the rules say. In practice CAs have a really hard time saying no to a multi-week extension because a too-big-to-fail company running "critical infrastructure" isn't capable of rotating their certs. Short cert duration forces companies to automate cert renewal, and with automation it becomes trivial to rotate certs in an acceptable time frame. |