Six day and IP address certificate options in 2025
Short-lived certificates & revocation
- Six‑day certs omit OCSP/CRL URLs; commenters note this is explicitly allowed for “short-lived” certs (≤10 days now, ≤7 days from 2026) under CA/Browser Forum rules.
- Revocation is seen as largely ineffective in practice: many clients ignore it, and past incidents (e.g., Heartbleed, leaked keys in support dumps) showed revoked certs still being used without user warnings.
- Shorter lifetimes are framed as a pragmatic way to reduce risk from undetected key compromise, though some see the threat model as narrow and benefits as modest.
Operational impact and automation
- Many argue 90‑day (and shorter) lifetimes are meant to force proper automation; if certs break every few days in staging, bugs get fixed earlier.
- Others report real friction: flaky automation, services that require restarts to load new certs, segmented networks, and offline/edge use cases.
- Hobbyists and small setups sometimes find renewals the least reliable part of their stack, provoking frustration with “opinionated” lifetime choices.
Outage and rate‑limit concerns
- Some fear a major Let’s Encrypt outage could break a large fraction of the web with 6‑day certs.
- Counterpoints: week‑long outages are seen as unlikely; robust clients can fall back to other ACME CAs. Skeptics worry that mass fallback could overload those CAs.
- With 5‑per‑7‑days limits for identical hostname sets, very aggressive renewal schedules (e.g., daily) may hit rate limits unless carefully managed.
IP address certificates & BGP/RPKI
- Attack surface is debated: many note BGP hijack–based issuance attacks already exist for domain certs using HTTP/TLS challenges.
- Proposed mitigations include multi‑vantage validation and tying issuance to IPs whose origin AS participates in RPKI; feasibility is unclear.
- LE’s six‑day max for IP certs is justified as limiting abuse, especially in cloud environments with frequently recycled IPs.
Use cases and limitations of IP certs
- Use cases mentioned: DoH/DDR resolvers, easy-to-remember diagnostic IPs, cloud demos where getting a domain is bureaucratically hard, and bootstrapping OAuth/tunnel tooling without a domain.
- No public CA support for private RFC1918 IPs; suggestion is to use DNS names (possibly internal) or private CAs.
Certificate Transparency & ecosystem tooling
- Short-lived certs will greatly increase CT log volume; CT monitors already face scalability issues but want full historical records.
- Some ACME clients and servers (e.g., Caddy, CertMagic, others) are already adding support for ACME profiles and short‑lived cert workflows.