| ▲ | bombcar 5 hours ago | ||||||||||||||||
Shortening certificate periods is just their way of admitting that certification revocation lists are absolutely worthless. | |||||||||||||||||
| ▲ | nightpool 5 hours ago | parent | next [-] | ||||||||||||||||
No, they're not useless at all. The point of shortening certificate periods is that companies complain when they have to put customers on revocation lists, because their customers need ~2 years to update a certificate. If CRLs were useless, nobody would complain about being put on them. If you follow the revocation tickets in ca-compliance bugzilla, this is the norm—not the exception. Nobody wants to revoke certificates because it will break all of their customers. Shortening the validity period means that CAs and users are more prepared for revocation events. | |||||||||||||||||
| |||||||||||||||||
| ▲ | nathanaldensr 5 hours ago | parent | prev [-] | ||||||||||||||||
Right. It's the same debate about how long authorization cookies or tokens should last. At one point in time--only one--authentication was performed in a provable enough manner that the certificate was issued. After that--it could be seconds, hours, days, years, or never--that assumption could become invalid. | |||||||||||||||||