Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Encryption Networking

CA/Browser Forum Votes for 47-Day Cert Durations By 2029 (computerworld.com) 69

"Members of the CA/Browser Forum have voted to slash cert lifespans from the current one year to 47 days," reports Computerworld, "placing an added burden on enterprise IT staff who must ensure they are updated." In a move that will likely force IT to much more aggressively use web certificate automation services, the Certification Authority Browser Forum (CA/Browser Forum), a gathering of certificate issuers and suppliers of applications that use certificates, voted [last week] to radically slash the lifespan of the certificates that verify the ownership of sites.

The approved changes, which passed overwhelmingly, will be phased in gradually through March 2029, when the certs will only last 47 days.

This controversial change has been debated extensively for more than a year. The group's argument is that this will improve web security in various ways, but some have argued that the group's members have a strong alternative incentive, as they will be the ones earning more money due to this acceleration... Although the group voted overwhelmingly to approve the change, with zero "No" votes, not every member agreed with the decision; five members abstained...

In roughly one year, on March 15, 2026, the "maximum TLS certificate lifespan shrinks to 200 days. This accommodates a six-month renewal cadence. The DCV reuse period reduces to 200 days," according to the passed ballot. The next year, on March 15, 2027, the "maximum TLS certificate lifespan shrinks to 100 days. This accommodates a three-month renewal cadence. The DCV reuse period reduces to 100 days." And on March 15, 2029, "maximum TLS certificate lifespan shrinks to 47 days. This accommodates a one-month renewal cadence. The DCV reuse period reduces to 10 days."

The changes "were primarily pushed by Apple," according to the article, partly to allow more effective reactions to possible changes in cryptography.

And Apple also wrote that the shift "reduces the risk of improper validation, the scope of improper validation perpetuation, and the opportunities for misissued certificates to negatively impact the ecosystem and its relying parties."

Thanks to Slashdot reader itwbennett for sharing the news.

CA/Browser Forum Votes for 47-Day Cert Durations By 2029

Comments Filter:
    • by allo ( 1728082 )

      Needed because revocation is broken.

      No money grab because there are several free CAs.

      • by Anonymous Coward

        Needed because revocation is broken.

        Then fix revocation so it isn't broken.

        Making it 7x more expensive fixes nothing. This is a money grab, nothing more.

        • There are complex reasons revocation doesn't work and simply saying fix doesn't actually fix it. Search the Security Now podcasts if you care to learn why, Steve Gibson has discussed this for years including recently. By the way, he is against shortening the duration. You seem to miss the point of the comment you were replying to since 7 x $0 = $0. Plus it's not clear that the annual cost will change for non free certs. The work required will change if you do it manually which encourages automation.
          • Steve Gibson is a monumental dickhead. Dropping his name does not do anything to convince me.

          • There are complex reasons revocation doesn't work and simply saying fix doesn't actually fix it.

            There is no actual complexity. There are not so many keys compromised in the world a complete list of actually compromised keys can't easily be globally distributed to browsers with regular deltas. The only reason the obvious is not being done is security isn't actually the point of this scheme.

            • by jsonn ( 792303 )
              So far two mechanisms have been tried for dealing with compromised keys. Certificate revocation lists and Online Certificate Status Protocol. Both create more problems than they solve. A certificate can be revoked not just because it s key has been compromised, but also simply because it is no longer meant to be used. That happens quite a lot actually in the modern virtualized world.
              • So far two mechanisms have been tried for dealing with compromised keys. Certificate revocation lists and Online Certificate Status Protocol. Both create more problems than they solve. A certificate can be revoked not just because it s key has been compromised, but also simply because it is no longer meant to be used. That happens quite a lot actually in the modern virtualized world.

                What actually matters? Security or making sure internal administrative constraints are enforced? The revocation lists are full of administrative nonsense not actual security breaches that have any substantive real world implications for users.

                How much is "certificate can be revoked not just because its key has been compromised" worth in the real world? Is it worth up to 45 days of ongoing compromise after there is a security breach because otherwise tombstoning compromised keys is "too hard"?

                The notion

                • by jsonn ( 792303 )
                  I love that you are just ignoring what others are saying. Let's ignore web servers for a moment and look at client certificates where the very same problems exist. If I have a client certificate on a smartcard, there are three main reasons for a revocation: (1) the smartcard was stolen (2) the smartcard had to be reissued (since it was "broken") or (3) the account was closed. In most environments, (2) and (3) are much, much more common than (1), but are entirely valid reasons for revocations with real world
          • by dgatwood ( 11270 )

            There are complex reasons revocation doesn't work and simply saying fix doesn't actually fix it.

            Neither does shortening the duration. All it does is slightly shorten the maximum amount of time that someone can use a stole private key/cert combination. And if they don't discover that the key is compromised, chances are, the website will generate a new cert with the same key, and it won't even do that.

            Revocation absolutely can work. You start by mandating OCSP, you follow it up by making browsers refuse to connect to TLS-enabled sides if OCSP servers are blocked, and you drag the certificate authorit

  • internal system / backend certs don't need this.

    • by bjoast ( 1310293 )
      They are not affected by this.
      • by bjoast ( 1310293 )
        Clarification: Assuming you have your own CA.
      • by cen1 ( 2915315 )
        Correct me if I'm wrong but if browsers enforce this duration, then it IS affected.
        • by Nkwe ( 604125 )

          Correct me if I'm wrong but if browsers enforce this duration, then it IS affected.

          It's generally not the browser that limits certificate lifetime -- the lifetime is embedded into the certificate and the browser enforces the expiration date baked into the certificate. If you run your own internal CA, you can issue certificates for whatever lifetime you want. You will have to add your internal CA's certificate to the browser's list of "trusted CAs" though. Depending on the browser, the list of trusted CAs may be configured within the browser install itself, or may be delegated to the opera

          • unless someone like google codes in some like if ca / cert life over XX days = mark ca / cert as untrusted.

            • by Nkwe ( 604125 )

              unless someone like google codes in some like if ca / cert life over XX days = mark ca / cert as untrusted.

              They could, but then they would not be following RFC 5280 [ietf.org] with regard to what defines a certificate's validity period.

          • by micheas ( 231635 )

            Correct me if I'm wrong but if browsers enforce this duration, then it IS affected.

            It's generally not the browser that limits certificate lifetime -- the lifetime is embedded into the certificate and the browser enforces the expiration date baked into the certificate. If you run your own internal CA, you can issue certificates for whatever lifetime you want. You will have to add your internal CA's certificate to the browser's list of "trusted CAs" though. Depending on the browser, the list of trusted CAs may be configured within the browser install itself, or may be delegated to the operating system's list of trusted CAs.

            My quick reading of it looks like this is the max age that a browser will accept.

            Any enterprise not using Automatic Certificate Management Environment (ACME) really needs to think about shifting to modern encryption infrastructure. Humans and AIs make mistakes and having an expired certificate because of human or AI error that causes your site to stop accepting traffic, if you have an enterprise level site, is ridiculous. If this causes any extra work for you, you're doing it wrong.

  • may seem random, but it's probably meant as 1.5 months plus a day of wiggle room. I was hoping for 42 though.

  • will renew fees be the same = pay an lot more or be same for 1 year?

  • One word (Score:4, Insightful)

    by Anonymous Coward on Saturday April 19, 2025 @04:10PM (#65317649)

    One word: Automation.

    Posting as anonymous coward for obvious reasons - my current employment is PKI.

    This will drive automation to a new level. There is no way IT grunts will be manually renewing these certificates. ACME, or something spawned from that, will be the name of the game for trusted TLS certificates. I've worked for companies where changing the TLS certificate on their main public facing websites was a whole process wrapped up in change control. Those processes will also need to change as it doesn't make sense with all of the overhead the change control process can add, to do this every 30 days.

    And if you are using TLS trusted certificates for internal-only facing systems, these will switch to private issuance, which do not need to follow the CA/B forum rules. For private issuance, you can issue certificates with validity that is in the hundred of years. There is absolutely no reason why internal systems need to use trusted certificates, and this will basically end that practice.

    Many things already use private issuance certificates such as Intune - it would be insane to have your Intune infrastructure use Trusted TLS given the number of certificates are issued for Intune configured systems and authentication.

    As an aside, the CA/B forum has also made OCSP optional, which over time you'll see less and less of. I know of some CA operators who are privately cheering for OCSP to go away as its a high volume real-time service that if it breaks, can break a lot of things rather quickly (speaking from experience).

    • change control issues or java app injecting issues / downtime. Makes automation not work.

      What about places where that cert change is part of an month or more long change control process?

    • by Nkwe ( 604125 )

      There is absolutely no reason why internal systems need to use trusted certificates, and this will basically end that practice.

      Being pedantic, but I assume you mean no reason for internal use of publicly trusted certificates. From a security point of view, it's a bad idea not to validate certificates on internal systems -- you need to validate them against your internal CA of course, but failure to validate would open you up to internal threats.

      • by tepples ( 727027 )

        I assume you mean no reason for internal use of publicly trusted certificates.

        If you're streaming video from a server on a home LAN or an air-gapped network to a smart TV or a streaming stick, the server will probably need a publicly trusted certificate. I've been told major brands of streaming device have no way to let the user install a privately trusted certificate.

        • by EvilSS ( 557649 )
          Why are you using a cert at all in this case at all? I do this today and none of the streams require public certs to work.
    • One word: Automation.

      Still needs testing and verification afterward. Now each instance will have ten chances to break each year instead of one.

      I've worked for companies where changing the TLS certificate on their main public facing websites was a whole process wrapped up in change control.

      Probably somebody broke it in the past. I've seen that happen too.

      • by tlhIngan ( 30335 )

        Still needs testing and verification afterward. Now each instance will have ten chances to break each year instead of one.

        Which is likely to be better - first, something that breaks once every couple of years will likely be put up with because it's not worth putting in the effort of fixing. Except now that tribal knowledge is having to be passed on because no one can be bothered to fix it.

        If it breaks every other time every few weeks, then there's much more incentive to fix it properly so it quits breaking

        • Once that knowledge gets put into scripts, if in a few months you discover the script overlooked something, you fix the script and make life simple.

          A lot of stuff is complicated enough it is simply better to do in person. Zero impact changes often require failover/failback of HA pairs. Appliances like ASAs or F5s may have dozens of different cert chains on the same device. Not everyone can just use certbot in a cron job.

          • by jsonn ( 792303 )
            Changing a certificate on a service should not be complicated. There is absolutely no reason for it to be complicated. Stop making excuses for badly designed systems.
            • by tepples ( 727027 )

              What's the uncomplicated way to change a certificate on a service on an air-gapped network, where you control the server and do not control the clients' certificate stores?

              • by jsonn ( 792303 )
                The pedantic answer: your problem is not the changing the certificate, but distributing it. It's a small but important distinction. The real answer would be: run a trusted Subordinate CA inside the air-gapped network. For the certificate of the Subordinate CA, different rules apply.
                • Because you don't control the clients' certificate stores, your subordinate CA is not trusted. Instead, your server must use a certificate from a publicly trusted CA that the client already recognizes. And all the publicly trusted CAs are about to require a (roughly) monthly rotation.

            • Changing a cert without dropping any client connections means servicing new requests and old requests differently, either statefully moving them from old to new or supporting them till they are timeout or closed. Certs are used not just for websites (not that you should boot people off those either) but also for things like SSL VPN connections where you can't just restart the service while people are working. If you have maintenance windows where you can tell people don't use the service at this time cau
          • by micheas ( 231635 )

            Once that knowledge gets put into scripts, if in a few months you discover the script overlooked something, you fix the script and make life simple.

            A lot of stuff is complicated enough it is simply better to do in person. Zero impact changes often require failover/failback of HA pairs. Appliances like ASAs or F5s may have dozens of different cert chains on the same device. Not everyone can just use certbot in a cron job.

            F5s can be managed from the command line and can have their configs checked into code. F5 even offically supports ansible for managing it https://clouddocs.f5.com/produ... [f5.com]

            So, it certainly can be managed from a cron job.

        • by micheas ( 231635 )

          Still needs testing and verification afterward. Now each instance will have ten chances to break each year instead of one.

          Which is likely to be better - first, something that breaks once every couple of years will likely be put up with because it's not worth putting in the effort of fixing. Except now that tribal knowledge is having to be passed on because no one can be bothered to fix it.

          If it breaks every other time every few weeks, then there's much more incentive to fix it properly so it quits breaking so often. And something that breaks every few months is more likely to be passed onto the next guy because it's more recent information than something that only happens once every couple of years.

          I've worked for companies where changing the TLS certificate on their main public facing websites was a whole process wrapped up in change control.

          Probably somebody broke it in the past. I've seen that happen too.

          It likely happened because it's a process that doesn't happen often, so all the tricks you learned this time around are forgotten the next time it happens. When a certificate expires yearly, someone has to remember what they did last year in order to renew it all. And likely things broke because they forgot some things.

          Once that knowledge gets put into scripts, if in a few months you discover the script overlooked something, you fix the script and make life simple. The script becomes the working memory and if something breaks, the script can be run through manually to ensure every piece is updated.

          Also, there's a chance if something breaks, it'll get caught all that much quicker - someone moves a file somewhere and it's forgotten about a year later. Here it's only a month and a half and chances are someone remembers "Oh, we moved that a month ago!".

          This ^

          And the more complicated the more you want things to be fully automated. Manual enterprise deploys have about an 80% fail rate while automated deploys have a far less than 1% fail rate.

          as for "you need to test your site after deploying a new certificate" If it is important enough to be paying someone to work on it, it should be monitored 24x7 anyways.

          The biggest problem with the automated certificates is that the tooling around them is so good you have people who set them up and are in charge of th

    • This will drive automation to a new level. There is no way IT grunts will be manually renewing these certificates. ACME, or something spawned from that, will be the name of the game for trusted TLS certificates.

      How many breaking changes have their been to ACME in the past few years and how many can we expect in the future?

      • This will drive automation to a new level. There is no way IT grunts will be manually renewing these certificates. ACME, or something spawned from that, will be the name of the game for trusted TLS certificates.

        How many breaking changes have their been to ACME in the past few years and how many can we expect in the future??

      • by jsonn ( 792303 )
        Let's encrypt itself had one major (potentially breaking) update of the ACME protocol and the deprecation and subsequent removal of one challenge type in its 10 year history so far. Compared to a lot of mission critical things, that's a pretty decent track record.
    • >"One word: Automation."

      Another three words: Not Possible Everywhere

      I have outsourced systems that use subdomains of my domain and I can't control those systems or install certs on them. And the system is needed 24/7. And it needs to be accessed from everywhere. And installing a certificate means major effort, tickets, additional scheduling, payments, support time, downtime, etc. Doing it annually was already too much.

  • by nicubunu ( 242346 )

    Any insight why they picked 47 as the magic number? Why not 46 or 48? Or more likely a multiple of 7, to account for weeks?

    • by Entrope ( 68843 )

      I would guess ceil(31 * 1.5), but that's pretty arbitrary and (to me) 31+2*7 would make just as much sense.

      • by jsonn ( 792303 )
        Almost. The first assumption made is that it is recommended to update certificates after around 2/3 of their life time. The expected update cycle was 30 days, so 45 days of life time. 47 days is essentially a bit of wiggle room for various smaller delays that could pop up along the line like if you can only update a service once a day.
    • Any insight why they picked 47 as the magic number? Why not 46 or 48? Or more likely a multiple of 7, to account for weeks?

      I think for business purposes you'd want a multiple of 7 plus a few days extra, in case of unforeseen complications / emergencies - and 47 accomplishes that.

      There's no reason you couldn't renew every 42 days under this stricture. Or schedule it "on the first Tuesday of each month".

      Personally I see this as largely security theater, but trying to argue against it does seem like opposing the tides at this point...

  • All the legacy systems will be so broken. currently some of them are already a pain to update yearly, with no reasonable way to automate.

    I guess there will be a need to put a reverse proxy with the automated certificate renewal in front of them.

  • How about no? (Score:5, Insightful)

    by sjames ( 1099 ) on Saturday April 19, 2025 @05:11PM (#65317761) Homepage Journal

    At the rate they're going, they'll need to invent new low latency networking and data processing technologies in order to renew the certs before the old one (issued 30 seconds ago) expires.

  • Yay (Score:5, Insightful)

    by peppepz ( 1311345 ) on Saturday April 19, 2025 @05:21PM (#65317777)
    Even more red tape and gatekeepers who get a say in who can communicate over the Internet and how hard it has to be. I remember when it was Microsoft who wanted to make internet protocols more complicated in order to get a competitive edge over the open source community; back then when their plans were exposed there was outrage. Nowadays Google and Apple basically are the internet, and they don't need to work in the shadows to subvert the protocols, because whatever it is that they decide for the day is automatically the "living standard".
  • by SubmergedInTech ( 7710960 ) on Saturday April 19, 2025 @05:31PM (#65317789)

    And please change your car's oil every 47 days.

    For the exact same reason.

    • by Anonymous Coward

      Well see, the US expired with the 47th president and now needs a reset. So the number makes sense.

  • by Arrogant-Bastard ( 141720 ) on Saturday April 19, 2025 @06:23PM (#65317863)
    1. Many organizations use change control (and most organizations should). Which means: changes to the production configuration require vetting via a process that's designed to try to stop broken changes from being deployed in a live environment. In other words, deployment is deliberately not automated because a human (or humans) are in the loop. This change represents a significant additional workload on those humans, and one of the ways that many humans respond to such an increase is to get annoyed by the extra work and start finding ways to shortcut the process. In other words, you can expect people to be very diligent when they only have to do something once a year, but every 45 days? Not so much.

    2. Other organizations will resort to automation, which will in turn make supply-chain attacks that leverage the automation much more attractive. I'll predict that within a year of this change going live we'll see just such an attack.

    3. This isn't going to significantly increase aggregate security, because -- for the most part -- certificates aren't the security problem. Bad software, e.g. WordPress, that's widely deployed and poorly maintained is a much bigger problems.

    4. The argument that this will stop some cryptographic exploits is weak, at best. The primary threats in that space are nations, and this change won't really affect them -- because they have far more resources than defenders, and they can readily deal with an 8X decrease in certificate duration by allocating 10X the computing power. (Which, since they're no doubt aware of this year-long debate, and since they know when this goes into effect, they have plenty of time to plan and execute.)
  • Because when an API has a choice between weak password authentication and stronger certificate authentication they're going to pick the password authentication when this shit gets crammed down their throats.

    And for anyone saying there's no reason for an API to invalidate its certificates every 47 days, as soon as the one-year limit hit every API I work with and there's several switched to that. So the 47-day one is next.
    • by ls671 ( 1122017 )

      When an API can use weak passwords, it can also generate its own certificate independently from any web certificate authority like for example, openvpn with easyrsa which generates its own certificate independently so your point is really moot. For web certificates used for access for the public at large, there is no weak password option. Furthermore, for internal web sites, you will still be able to generate your own certificates internally and independently and have them last several years if you wish. Th

    • by jsonn ( 792303 )
      Your post makes no sense. Please think again who is using what kind of certificate for which purpose...
  • by WaffleMonster ( 969671 ) on Saturday April 19, 2025 @08:36PM (#65318041)

    The CA scheme for DV is needlessly dangerous and redundant and needs to end. Existing schemes like ACME are still based entirely upon insecure indications from insecure protocols.

    There is no reason for global overlapping trust anchors to exist in the first place. This only creates more avoidable avenues for global compromise with zero commensurate benefit.

    More importantly it is redundant for a third party to seek to independently establish domain ownership when this function should just be a function of the domain registrar which already has an existing relationship with the domain owner. There was never any reason for CAs to insert themselves into the process in the first place. It used to be in the early days the CAs would validate you as an organization but that quickly devolved into a lights out process involving placing files in folders and servers making insecure HTTP requests to retrieve those files.

    Neither do I accept the legitimacy of a handful of corporations voting for a change that has substantial global administrative impacts on countless millions of the worlds operators without any substantive outreach, study or consensus.

    Personally I will be working to advocate for expansive use of PAKEs as an alternative to global trust anchors. Most every website worth securing has some form of independent trust relationship with the user. The insecure and dangerous universal practice of authentication via adhoc web forms in plain text over TLS has lead to unnecessary and substantially avoidable mass ownage via phishing related exploits. The utilization of secure authentication based on zero knowledge proofs is far more secure than DV certificates.

    Most sites and internal applications should have never required PKI in the first place. This was always something that has been dominated by band-aids and inertia. A series of decisions that were rational at the time yet in totality have become untenable.

    Global trust anchors should only have ever been used sparingly as onramps for service discovery and onboarding. It was always foolish to aggregate so much responsibility into the hands of the few with global potentially catastrophic consequences. It is past time to end DV certs as we know them.

    • by jsonn ( 792303 )
      ACME with a sane CA is about as strong as DV can get. If you implement DNSSEC and use the DNS-01 challenge type, you have a trust chain for the ACME challenge itself. I'm going to ignore the rest of the rant as pointless.
      • ACME with a sane CA is about as strong as DV can get.

        ACME is STILL based on INSECURE indications from INSECURE protocols. This isn't strength, it is a PATHETIC joke.

        If you implement DNSSEC and use the DNS-01 challenge type, you have a trust chain for the ACME challenge itself.

        If everyone had DNSSEC there would be no need for DV CAs and this would all be MOOT.

        I'm going to ignore the rest of the rant as pointless.

        If you have nothing to say keep your mouth shut.

        • by jsonn ( 792303 )
          It's funny when someone proves you wrong and you just continue ranting. Here's a fish, maybe return to your bridge...

Executive ability is deciding quickly and getting somebody else to do the work. -- John G. Pollard

Working...