Let’s Encrypt will be reducing the validity period of the certificates we issue. We currently issue certificates valid for 90 days, which will be cut in half to 45 days by 2028.
This change is being made along with the rest of the industry, as required by the CA/Browser Forum Baseline Requirements, which set the technical requirements that we must follow. All publicly-trusted Certificate Authorities like Let’s Encrypt will be making similar changes. Reducing how long certificates are valid for helps improve the security of the internet, by limiting the scope of compromise, and making certificate revocation technologies more efficient.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    3
    ·
    edit-2
    15 hours ago

    Seeing as most root CA are stored offline compromising a server turned off is not really possible.

    I’m more annoyed that I have 10 year old gear that doesn’t have automation for this.

    • AA5B@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 hours ago

      Signing (intermediate) certs have been compromised before. That means a bad actor can issue fake certs that are validated up to your root ca certs

      While you can invalidate that signing cert, without useful and ubiquitous revocation lists, there’s nothing you can do to propagate that.

      A compromised signing certs, effectively means invalidating the ca cert, to limit the damage

    • Arghblarg@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      ·
      15 hours ago

      Oh, I’m really just pining for the days before the ‘Eternal September’, I suppose. We can’t go back, I know. :/