December 12th, 2024

A Note from Our Executive Director

Let's Encrypt, serving over 500 million websites, plans to introduce six-day TLS certificates to enhance security. The organization emphasizes automation and relies on donations for ongoing projects as it celebrates its 10th anniversary.

Read original articleLink Icon
A Note from Our Executive Director

In a note from Executive Director Josh Aas, the Internet Security Research Group (ISRG) reflects on a successful year for Let's Encrypt, which now serves over 500 million websites with free 90-day TLS certificates. The organization is preparing to celebrate its 10th anniversary and plans to introduce a new offering of short-lived certificates with a lifespan of six days, aimed at enhancing security by reducing exposure during key compromise events. Aas emphasizes the importance of automation, noting that most subscribers will easily transition to these new certificates. He acknowledges the challenges faced in scaling the service and launching new projects like Divvi Up and Prossimo, which enhance internet security infrastructure. The letter highlights the critical role of donations and corporate sponsorships in supporting ISRG's mission, encouraging continued financial support to ensure the future of a secure and privacy-respecting web.

- Let's Encrypt serves over 500 million websites with free TLS certificates.

- A new offering of six-day short-lived certificates will enhance security.

- Automation will facilitate the transition for most subscribers to the new certificate model.

- Donations and sponsorships are vital for ISRG's ongoing projects and mission.

- The organization celebrates its 10th anniversary in 2024, marking significant growth and impact.

Link Icon 4 comments
By @politelemon - about 1 month
Key bit:

> but we are going to introduce a new offering that’s a big shift from anything we’ve done before - short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.

By @samgranieri - about 1 month
On a side note, I've had fun playing with something like this with Caddy and StepCA and bind running in a homelab. I've managed to, using the rfc2136 plugin, managed to rotate certs every ten minutes.

Every six days is fine, just use something like Caddy that rotates the certs for you and it should just be set it and forget it.

Yes, I realize this is a bit glib.

By @rurban - about 1 month
Prossimo: That would be rustls, a project that bypassed openssl in every aspect by now. Really everybody should switch over.

https://www.memorysafety.org/initiative/rustls/

By @nodesocket - about 1 month
Interesting choice of 6 days. Any reason 6 was picked?