Getting ready to issue IP address certificates
Intended Use Cases
- Hobby/self-hosting on static public IPs without registering domain names.
- Temporary or experimental services (dev/test environments, dashboards during DNS restructuring).
- Appliances and infrastructure that are addressed only by IP, not DNS.
- Direct connections to DNS-over-TLS/HTTPS servers or auth DNS servers by IP.
- Potential use for NTS (Network Time Security) to get trusted time when DNS/DNSSEC is broken.
Technical Scope and Limitations
- Works for both IPv4 and IPv6, but only for globally routable, publicly reachable IPs.
- Short-lived profile only: 6‑day validity, intended to limit risk with reallocated addresses.
- Challenges restricted to HTTP-01 and TLS-ALPN-01; DNS challenge is not available for IPs.
- No private RFC1918 or other non-global addresses; public CAs cannot meaningfully validate “ownership” there.
Security, Identity, and Attack Models
- Debate over whether IPs should be used as stable identities vs. “keys-as-names” models (WireGuard/Yggdrasil style).
- Critics argue IPs are mutable, often shared (NAT, cloud), and not good identifiers; fear of new X.509 validation bugs and ecosystem complexity.
- Supporters say most software they use already handles IP SANs fine and many real deployments have long-lived IPs.
- Concern about attackers obtaining certs on ephemeral cloud IPs and then releasing them; mitigated somewhat by 6‑day lifetime and existing ability to abuse domain-based names similarly.
- Some worry this encourages more hard-coded IPs and brittle architectures.
Privacy, ESNI/ECH, and DNS Interaction
- Suggestion: IP certs could broaden ESNI/ECH deployment and enable hiding SNI even for small sites.
- Counterpoint: DNS (especially DoH/DoT plus DNS-based ECH keys) is already the main privacy and integrity channel; unclear what adversary is uniquely stopped by IP certs.
- Discussion of time bootstrapping: using IP-addressed HTTPS servers’ Date headers vs. NTS and DNSSEC’s tighter time requirements; some note hardware clock + DHCP-provided NTP is usually enough.
Private Networks and Home Routers
- IP certs won’t help with 192.168.x.x/10.x.x.x/172.16.x.x; repeated requests for that were clarified as impossible for public CAs.
- Suggested workarounds:
- Private CA and importing its root.
- Reverse proxies with public-domain certs plus local DNS rewrites.
- Domains that resolve to private IPs (with caveats when internet/DNS is down).
Certificate Format and Implementation Details
- Let’s Encrypt is removing CN usage in short-lived certs, relying solely on SAN; most clients are believed to handle this.
- IP SANs are binary-encoded (no wildcard semantics); wildcard IP certs are not possible by spec.
- Minor side-thread on a Firefox UI regex bug in IPv6 formatting—affects display, not security.
Other Tangents
- Some argue Let’s Encrypt efforts would be more impactful for free S/MIME, but others say end-user key management remains a major usability barrier.
- One commenter frames IP certs as just another vector for TLS exploitation; others note IP certs already existed with other CAs, Let’s Encrypt is simply making them more accessible.