| ▲ | Sohcahtoa82 12 hours ago | ||||||||||||||||||||||
It's really security theater, too. Though if I may put on my tinfoil hat for a moment, I wonder if current algorithms for certificate signing have been broken by some government agency or hacker group and now they're able to generate valid certificates. But I guess if that were true, then shorter cert lives wouldn't save you. | |||||||||||||||||||||||
| ▲ | NoahZuniga 11 hours ago | parent | next [-] | ||||||||||||||||||||||
> broken by some government agency or hacker group Probably not. For browsers to accept this certificate it has to be logged in a certificate transparency log for anyone to see, and no such certificates have been seen to be logged. | |||||||||||||||||||||||
| ▲ | woodruffw 10 hours ago | parent | prev | next [-] | ||||||||||||||||||||||
One of the ideas behind short-lived certificates is to put certificate lifetimes within the envelope of CRL efficacy, since CRLs themselves don’t scale well and are a significant source of operational challenges for CAs. This makes sense from a security perspective, insofar as you agree with the baseline position that revocations should always be honored in a timely manner. | |||||||||||||||||||||||
| ▲ | vbezhenar 11 hours ago | parent | prev | next [-] | ||||||||||||||||||||||
I'm not sure it is about security. For security, CRLs and OCSP were a thing from the beginning. Short-lived certificates allow to cancel CRLs or at least reduce their size, so CA can save some expenses (I guess it's quite a bit of traffic for every client to download CRLs for entire letsencrypt). | |||||||||||||||||||||||
| ▲ | wang_li 11 hours ago | parent | prev [-] | ||||||||||||||||||||||
My browser on my work laptop has 219 root certificates trusted. Some of those may be installed from my employer, but I suspect most of them come from MS as it's Edge on Windows 11. I see in that list things like "Swedish Government Root Authority" "Thailand National Root Certification Authority" "Staat der Nederlanden Root CA" and things like "MULTICERT Root Certification Authority" "ACCVRAUZ1". I don't think there is any reason to believe any certificate. If a government wants a cert for a given DNS they will get it, either because they directly control a trusted root CA, or because they will present a warrant to a company that wants to do business in their jurisdiction and said company will issue the cert. TLS certs should be treated much more akin to SSH host keys in the known hosts file. Browsers should record the cert the first time they see it and then warn me if it changes before it's expiration date, or some time near the expiration date. | |||||||||||||||||||||||
| |||||||||||||||||||||||