Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Encryption

Let's Encrypt Announces New-Certificate-Every-6-Days Offering (letsencrypt.org) 28

The non-profit, free certificate authority Let's Encrypt shared some news from their executive director as they approach their 10th anniversary in 2025: Internally things have changed dramatically from what they looked like ten years ago, but outwardly our service hasn't changed much since launch. That's because the vision we had for how best to do our job remains as powerful today as it ever was: free 90-day TLS certificates via an automated API. Pretty much as many as you need. More than 500,000,000 websites benefit from this offering today, and the vast majority of the web is encrypted.

Our longstanding offering won't fundamentally change next year, but we are going to introduce a new offering that's a big shift from anything we've done before — short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.

Because we've done so much to encourage automation over the past decade, most of our subscribers aren't going to have to do much in order to switch to shorter lived certificates. We, on the other hand, are going to have to think about the possibility that we will need to issue 20x as many certificates as we do now. It's not inconceivable that at some point in our next decade we may need to be prepared to issue 100,000,000 certificates per day. That sounds sort of nuts to me today, but issuing 5,000,000 certificates per day would have sounded crazy to me ten years ago... It was hard to build Let's Encrypt. It was difficult to scale it to serve half a billion websites...

Charitable contributions from people like you and organizations around the world make this stuff possible. Since 2015, tens of thousands of people have donated. They've made a case for corporate sponsorship, given through their Donor-Advised Funds, or set up recurring donations, sometimes to give $3 a month. That's all added up to millions of dollars that we've used to change the Internet for nearly everyone using it.

Thanks to long-time Slashdot reader rastos1 for sharing the news.

Let's Encrypt Announces New-Certificate-Every-6-Days Offering

Comments Filter:
  • by Zarhan ( 415465 ) on Sunday December 15, 2024 @01:45PM (#65015143)

    That will *really* beef up security!

  • by PuddleBoy ( 544111 ) on Sunday December 15, 2024 @01:48PM (#65015153)

    I've use Let's Encrypt certs for years and never donated. [shame]

    But the article reminded me of my 'civic duty' and I've now donated.

    Thanks

  • by Excelcia ( 906188 ) <slashdot@excelcia.ca> on Sunday December 15, 2024 @01:54PM (#65015165) Homepage Journal

    I've never been much of a fan of DNSSEC, but nonsense like this make me hope someone will see some sense and finally make DANE a reality to take TLS away from chutzpahs like this.

    When is the last time a TLS certificate was compromised in a way that would make this even marginally warranted? The far more likely scenario is that a whole server will be compromised, in which case its LetsEncrypt client key is as compromised as the rest. Besides a few much publicized failures, mostly of CAs, there is nothing that warrants this level of client hoop-jumping and waste.

    • by cen1 ( 2915315 )
      Completely agree, this makes absolutely no sense. Don't CRLs and OCSP exist to invalidate a leaked key? What are we actually solving here? DANE should already work in theory and does for some applications (PGP), it's the browsers that refuse to implement it.
      • by bjoast ( 1310293 )
        Revocation in a PKI is not a solved problem. There are several ways to do it, and they each have drawbacks. That's because we want the cake (offline verification) and eat it too (online verification). OCSP for example has the problem of possibly introducing availability problems if attackers manage to block access to the OCSP responder, thus causing clients to not be able to reach protected resources. Many browsers ignore failures when an OCSP responder cannot be reached, and continue to connect anyways, bu
        • by dgatwood ( 11270 )

          Revocation in a PKI is not a solved problem. There are several ways to do it, and they each have drawbacks. That's because we want the cake (offline verification) and eat it too (online verification).

          In practice, if the duration were 6 days instead of 90 days, the various random problems I've had with LetsEncrypt when changing ISPs, changing registrars, etc. would have all resulted in downtime, where with 90 days, I usually got notification after 60 days that the renewals were down, and it usually took most of those remaining 30 days for me to find the time to actually deal with the problem.

          I can't imagine why anyone in their right minds would think that this is a good idea.

          Offline verification isn't ac

    • Something similar to DANE was available years ago:
      FreeS/WAN's opportunistic encryption. It used public keys found in the site's DNS to encrypt.

  • by gweihir ( 88907 ) on Sunday December 15, 2024 @01:55PM (#65015167)

    The more often a cert is replaced, the more devastating an attack on the replacement mechanism becomes. I do get that cert revocation does not work and cannot be fixed (the history of trying to do so is a sequence of hilarious failures), so short-lived certs is all we have. But they come with their own risks and are, at best, a band-aid.

  • by xack ( 5304745 ) on Sunday December 15, 2024 @01:55PM (#65015169)
    If something goes terribly wrong, most of the internet would collapse in 6 days. I've already seen major sites and software get hit with certificate expiries.
    • by CommunityMember ( 6662188 ) on Sunday December 15, 2024 @02:17PM (#65015213)

      If something goes terribly wrong, most of the internet would collapse in 6 days. I've already seen major sites and software get hit with certificate expiries.

      Although, more often than not, it was due to some process (manual or semi-automated) that was not validated in an appropriate time frame (they only did it once a year or once every few years, and in that time-frame "stuff" happens, including redundancies that eliminate key personnel). If your certs expire every 6 days you are going to strive to get that process working well.

    • While the risk is very well the problem with major sites is the opposite. The likelihood of errors in process increase with a rarity of a maintenance event. This has nothing to do with TLS by the way, you can find references to this in reliability textbooks, as well as human behavioural studies. Similar to making it a civic duty to call people who masturbate over their server's uptime idiots, and instead promoting administrators who are capable of setting up systems in such a way that they are able to reboo

  • by dsanfte ( 443781 ) on Sunday December 15, 2024 @02:28PM (#65015243) Journal

    Certificate expiry and renewal failures are a few orders of magnitude, maybe a dozen, above proven in-the-wild compromised TLS key attacks. There is a point where the tradeoff between security and reliability becomes far too bad to be worth it, and this tradeoff was already pretty bad with annual renewals. Now we see this insanity playing out.

    No. No more short lived certificates. Just stop.

  • Automation (Score:2, Interesting)

    by Kazymyr ( 190114 )

    I have used Let's Encrypt in the past, but don't anymore. While the service is useful, the automated renewal does not work when you use nonstandard ports and there is no workaround except to renew each certificate manually. It was enough of a hassle to do that every 90 days. I can't imagine what a nightmare would be to do it every 6 days.

    • 6 day work week for you no change m-f and each s is the renew day.
      Also no OT pay for that day to be on call.

      • by PPH ( 736903 )

        Do you want to be the person who tells my admin that he can never go on a cross country bicycle trip again. Well, he can. But he'd better pedal his ass off to get back here by Monday.

    • agreed, especially when using the DNS challenge I kept getting issues requiring manual intervention.
      system not internet facing, but a single https service available using sni tunneling through another system. This is a major PITA usecase for letsencrypt.

  • by whoever57 ( 658626 ) on Sunday December 15, 2024 @02:50PM (#65015267) Journal

    issue 100,000,000 certificates per day.

    I think more like 300,000,000 certificates per day. With a 6-day expiry, I'm not going to renew every 5 days, I am going to renew every day, just in case something goes wrong. Plenty of other sites are going to do the same.

  • Wrong approach. (Score:3, Interesting)

    by jd ( 1658 ) <imipak AT yahoo DOT com> on Sunday December 15, 2024 @03:51PM (#65015383) Homepage Journal

    A much better system would surely be to generate a Class III certificate suitable for a sub-certificate authority that expires maybe once every two years, and then generate short-lived certificates (3 months seems fine) using the Class III cert to sign with.

    The first reason for this is that the renewal system is your vulnerability. If the renewal system is distributed this way, you'd have to break it for every user independently.

    The second reason is that you can use GPG's recommended practice of using a different key for each recipient, so you now have to break every senter/recipient pair independently, too.

    However, if you run all connections between two nodes over an encrypted tunnel, an attacker can't distinguish a renewal from any other operation. The traffic is indistinguishable.

    That's the beauty of encrypted tunnels vs Just an encrypted packet - attackers have to attack the lot, not just the bits they want.

  • by PPH ( 736903 ) on Sunday December 15, 2024 @05:03PM (#65015467)

    Why not seven? Or the incoming cert is guaranteed to collide with Patch Tuesday periodically.

  • Why didn't any smart people think of this!

    Note this post is sarcastic, smart people did think of this. Rather than placing an amazing burden on automation and administration why not fix the damn certificate revocation mechanism instead. This is precisely the case it was designed for.

  • I expect the uptake on this is going to be really, really low. That makes it easy for everyone.

We must believe that it is the darkest before the dawn of a beautiful new world. We will see it when we believe it. -- Saul Alinsky

Working...