SSL certificate lifetimes are going down. Dates proposed. 45 days by 2027

Rationale for Shorter Certificate Lifetimes

  • Main driver: revocation is unreliable; shorter lifetimes limit how long a compromised key or misissued cert can be abused.
  • Shorter windows also make it easier to punish or distrust misbehaving CAs without leaving long-lived bad certs in the wild.
  • Frequent rotation forces automation; rare, manual rotations are brittle and often cause outages when they finally happen.
  • Some in PKI have long favored very short lifetimes (e.g., ~7 days) with no revocation, but see 45 days as an incremental, more realistic step.

Operational & Usability Concerns

  • Many organizations already struggle with 1-year certs; 45 days could be painful for orgs without automation, especially large enterprises.
  • Examples given of Fortune 500s that can’t even track expiring certs today.
  • Worry that more frequent failures will train users to click through cert errors.
  • Others counter that past lifetime reductions did push successful automation and were largely absorbed by industry.

Security Effectiveness Debate

  • Some say attackers can weaponize a stolen key within hours; even 1 week helps, but 45 vs 90 days may not be a huge difference.
  • Others argue that reducing an attacker’s window from years to weeks is still a meaningful improvement, even if not perfect.
  • Discussion over key reuse: some tools rotate private keys on each renewal; others default to reusing them, weakening the benefit.

Economics of CAs and “Free” Certificates

  • Operating a public CA is expensive; “free” certs are subsidized by donors or larger organizations.
  • Concern that dominance of free CAs creates a single point of failure and long‑term funding risk.
  • Some prefer paying for longer-lived certs to avoid automation work; others argue automation is trivial scripting.

Control, Freedom, and Browser Power

  • Some object to large vendors and CAB Forum constraining cert lifetimes and accepted CAs, framing it as loss of “personal freedom.”
  • Others respond that public certs are assertions to the global user base, not a personal choice; if you want full control, use a private CA or HTTP.
  • Debate around HTTPS‑everywhere, browser hostility to self‑signed certs, and comparisons to TOFU/SSH models, especially for low‑risk local services and offline or intermittently connected systems.