Let's Encrypt is offering 6-day and IP address certs
Let's Encrypt plans to introduce six-day certificates and support for IP address certificates in 2025, enhancing web security and reducing compromise risks. Rollout begins in February 2025.
Read original articleLet's Encrypt has announced plans to introduce six-day certificates and support for IP address certificates in 2025. The six-day certificates, which are considered "short-lived," aim to enhance web security by reducing the potential compromise window associated with longer-lived certificates. Currently, Let's Encrypt offers certificates with a 90-day lifetime, which will continue to be available alongside the new option. The short-lived certificates will not include Online Certificate Status Protocol (OCSP) or Certificate Revocation List (CRL) URLs, emphasizing the need for automation in certificate issuance. Additionally, the new feature will allow IP addresses to be included as Subject Alternative Names, enabling secure TLS connections without requiring a domain name. Validation for IP addresses will mirror that of domain names but will be limited to specific challenge types. The rollout is expected to begin in February 2025, with general availability anticipated by the end of the year. Users will need to utilize an ACME client that supports the new certificate profiles to take advantage of these options.
- Let's Encrypt will introduce six-day certificates in 2025 to improve web security.
- Short-lived certificates aim to reduce the risks associated with compromised keys.
- Support for IP addresses as Subject Alternative Names will be included in the new certificates.
- The rollout of short-lived certificates is expected to begin in February 2025.
- Users must use an ACME client that supports the new profiles to obtain these certificates.
Related
Sysadmins rage over Apple's 'nightmarish' SSL/TLS cert lifespan cuts
Apple proposes reducing SSL/TLS certificate lifespans from 398 days to 45 days by 2027, aiming to enhance security, but system administrators are concerned about increased management workload and automation challenges.
A Note from Our Executive Director
Let's Encrypt, serving over 500 million websites, plans to introduce six-day TLS certificates to enhance security. The organization emphasizes automation and relies on donations for ongoing projects as it celebrates its 10th anniversary.
Short-Lived Certificates Coming to Let's Encrypt
Let's Encrypt will introduce six-day short-lived certificates next year to enhance TLS security by reducing key compromise exposure. The transition is expected to be seamless for subscribers due to automation.
Let's Encrypt to end OCSP support in 2025
Let's Encrypt will discontinue OCSP support in 2025 due to privacy and performance issues, transitioning to alternative solutions like CRLite, which may disrupt systems relying on OCSP for certificate validation.
Certificate Profile Selection (Let's Encrypt)
Let's Encrypt has introduced "profile selection" for certificate requests, allowing users to choose from profiles like "classic" and "tlsserver," with a "shortlived" profile coming soon for six-day certificates.
- Concerns about the potential security risks associated with short-lived certificates and IP address certificates, including the possibility of increased attack vectors.
- Discussion on the practicality and implications of managing frequent certificate renewals, especially in cloud environments.
- Questions regarding the necessity and use cases for IP address certificates, with some commenters highlighting specific scenarios.
- Criticism of the lack of OCSP or CRL URLs in the new certificates, raising concerns about revocation and security.
- General skepticism about the overall benefits of the proposed changes compared to the risks they may introduce.
boringproxy needs to provide a callback redirect_uri to the oauth server in order to retrieve it's token, which it can then use for setting DNS records. However, it can't provide an HTTPS endpoint until it can set up those DNS records and get a cert. Chicken/egg. Currently the spec requires the server to implement a `GET /temp-domain` endpoint which creates a DNS record like 157-245-231-242.example.com which points at the client's IP. This lets boringproxy bootstrap a secure OAuth2 callback endpoint.
IP certs would remove an entire step from this process.
[0]: https://github.com/takingnames/namedrop-protocol-spec
[1]: This is actually broken in boringproxy at the moment, but there's a demo video here: https://www.youtube.com/watch?v=9hf72-fYTts
I am gonna try to run a DoH resolver on this and see how it goes.
* https://datatracker.ietf.org/doc/draft-aaron-acme-profiles/
The ACME spec is:
I am operating https://www.merklemap.com/ and the current scale is already impressive.
https://letsencrypt.org/2025/01/16/6-day-and-ip-certs/#short...
But... How often do these types of compromises happen? I can't say I've ever seen or heard of it happening.
Is in-addr.arpa. not usable for these purposes? Given how you can do PTR records to map IP address to domain name, I had just assumed it would be at least theoretically usable for more, even if few or no hosts exposed it so at present.
Someone already mentioned that it's needed for Discovery of Designated Resolvers (DDR) for DNS-over-HTTPS. Anything else?
I sometimes deal with a relying party that insists on public CA issued certs for TLS client use, and then makes rotation very painful behind a portal with 2FA etc. This would be fine if public CAs issued certs for 5 years but they seem to be limited to 1 year now because of browser policy.
(Or I'll switch to a different ACME client I suppose)
1. Lease IP
2. Obtain cert (verify can receive traffic to IP on port 80)
3. Give IP back
4. Cloud provider gives IP to another customer
5. Bgp attack IP with 6 days.
While I support the idea of IP certs I do wonder how thought through this is and what the future consequences for security are.
I agree with another commenter here who said this should be limited to IPs behind RPKI.
Possibly also needs a mechanism for IP owners to clamp the cert time to be below their IP re-lease policy. As an example a provider like AWS could require max certs of (say) 6 hours and ensure any returned IPs stay unleased for 6 hours before reissuing them)
If someone else did this, Mozilla would be threatening to remove them from their trusted roots.
IP address certs sound like a security nightmare that could be subverted by BGP hijacking. Which is why most CAs don't issue them. Does accessing the ACME challenge from multiple endpoints adequately prevent this type of attack?
Related
Sysadmins rage over Apple's 'nightmarish' SSL/TLS cert lifespan cuts
Apple proposes reducing SSL/TLS certificate lifespans from 398 days to 45 days by 2027, aiming to enhance security, but system administrators are concerned about increased management workload and automation challenges.
A Note from Our Executive Director
Let's Encrypt, serving over 500 million websites, plans to introduce six-day TLS certificates to enhance security. The organization emphasizes automation and relies on donations for ongoing projects as it celebrates its 10th anniversary.
Short-Lived Certificates Coming to Let's Encrypt
Let's Encrypt will introduce six-day short-lived certificates next year to enhance TLS security by reducing key compromise exposure. The transition is expected to be seamless for subscribers due to automation.
Let's Encrypt to end OCSP support in 2025
Let's Encrypt will discontinue OCSP support in 2025 due to privacy and performance issues, transitioning to alternative solutions like CRLite, which may disrupt systems relying on OCSP for certificate validation.
Certificate Profile Selection (Let's Encrypt)
Let's Encrypt has introduced "profile selection" for certificate requests, allowing users to choose from profiles like "classic" and "tlsserver," with a "shortlived" profile coming soon for six-day certificates.