TLS certificate lifetimes will officially reduce to 47 days
Overall reaction
- Thread is sharply polarized.
- Supporters see this as a natural continuation of the last decade’s move toward automation and shorter lifetimes.
- Opponents call it “catastrophic”, unnecessary “security busywork”, and accuse the CA/B Forum and browsers of ignoring operational reality and concentrating power.
Security rationale and claimed benefits
- Shorter lifetimes reduce exposure from:
- Mis‑issued or compromised certificates that can’t be reliably revoked.
- Stale validation data (domain control, organization info, old DCV methods).
- Long‑lived certs obtained via BGP hijack or past CA incidents.
- Revocation (OCSP/CRL) is widely seen as broken or inconsistently checked; short lifetimes are framed as a de‑facto revocation mechanism.
- Some argue this also reduces CA “too big to fail” risk: misbehaving CAs’ impact is naturally time‑limited.
Operational and automation impacts
- Pro‑change side:
- “If a human can do it, a machine can” – treat this as a forcing function to adopt ACME, monitoring, and proper PKI hygiene.
- Believe most sites can use free ACME clients, reverse proxies (Caddy, Traefik), or managed CDNs/ALBs to automate.
- Anti‑change side:
- Many products (IIS, F5, NAS, IPMI, older appliances) lack first‑class ACME; workarounds are brittle glue scripts and REST hacks.
- Large shops already struggle with 1‑year certs; 47‑day cycles increase failure modes (especially across weekends, vacations, long chains of approvals).
- Multi‑server deployments, non‑HTTP services, and segmented networks complicate automation.
Small orgs, legacy systems, and internal PKI
- Concern that this disproportionately hurts small orgs and “off‑the‑shelf” users, pushing them toward big cloud vendors and managed platforms.
- Many enterprises are already moving most internal services to private CAs with long‑lived certs; some see that as the desired outcome.
- Others note running an internal CA and rolling it out across mixed fleets (desktops, phones, containers, IoT) is non‑trivial.
Self‑hosting and “grassroots internet”
- Some fear this accelerates the decline of DIY hosting and independent sites, making “simple home server + static HTML” less viable and increasing dependence on third‑party platforms.
- Counterargument: ACME + modern proxies actually make HTTPS easier than the pre‑Let’s‑Encrypt era of expensive, fax‑verified multi‑year certs.
Identity vs encryption and alternatives
- Long subthread debates whether TLS’s real value is encryption alone or authenticated identity.
- Several argue unauthenticated encryption (self‑signed, TOFU) is fine for many small/local use cases and browsers are too hostile to it.
- Others reply that on hostile networks (coffee‑shop Wi‑Fi, ISPs) MITM is the primary threat; without identity, encryption is easily intercepted.
- Alternatives like DANE/DNSSEC, SSH‑style TOFU, local CAs, and special “intranet” trust models are discussed but seen as poorly deployed or lacking browser support.
Revocation, short‑lived certs, and CT
- Broad agreement that OCSP and CRLs don’t work well in practice; many clients don’t check them consistently.
- Short‑lived certs (down to 7 days, even 6‑day options) are presented as a way to bypass revocation altogether at the cost of heavier infrastructure load (CT logs, CAs, HSMs).
- Some worry about the “purity spiral”: effort poured into certificate hygiene instead of larger, more common security problems.
Governance, incentives, and “endgame” concerns
- Multiple comments note this change was driven primarily by browsers (especially Apple/Google) with CAs concurring; browsers represent billions of relying parties.
- Critics argue the decision externalizes costs onto operators while browsers/large CAs bear little downside. Some raise legal‑exposure and central‑control theories; defenders call such claims “silly” or conspiratorial.
- Speculation on the “endgame”: very short lifetimes (hours or minutes) or even per‑connection online validation is raised and generally dismissed as operationally and audit‑wise untenable, though many expect further reductions after 2029.