Decreasing Certificate Lifetimes to 45 Days
Overall Reaction to 45‑Day Lifetimes
- Many are supportive, seeing it as a natural continuation of “certs must be automated” and praising how Let’s Encrypt transformed WebPKI and made HTTPS ubiquitous and cheap.
- Others strongly dislike the change, calling it bureaucratic burden/“bait” that pushes complexity onto small sites and admins who were comfortable with annual or multi‑year manual renewals.
- Some fear lifetimes will keep shrinking (to 7 days or less), and that this will normalize users ignoring TLS errors.
Automation vs Manual Management
- Pro‑automation experiences: once set up, ACME‑based renewal is described as essentially zero‑maintenance and vastly cheaper than manual processes; several report no TLS outages in years versus painful outages from forgotten long‑lived certs.
- Skeptical voices argue automation “just breaks”: OS upgrades, webserver misconfig, ACME client changes, DNS API tokens, etc., can silently fail until certs are near expiry, now with half the margin.
- Small hobby sites: some say hosting or modern servers (Caddy, built‑in ACME) make this trivial; others argue that for 1–2 static sites, 10 minutes/year of manual work was simpler and more predictable.
Enterprise, Legacy, and Special Cases
- Enterprise products and legacy systems often lack good APIs or automation hooks; some still require manual PKCS#12 handling, restarts, or partner‑side manual updates every renewal.
- IoT and heterogeneous fleets (old appliances, B2B integrations) are cited as especially painful; several argue these should move to private CAs where lifetimes can be longer.
- Concern that holiday freeze/compliance windows plus shorter lifetimes reduce the safe window to notice and fix broken automation.
Rationale and Ecosystem
- The immediate driver is CA/Browser Forum rules; commenters say the deeper reason is that revocation (CRLs/OCSP) doesn’t work well, so short lifetimes limit damage from mis‑issuance or key compromise.
- Shorter lifetimes also reduce revocation‑list size and fit better with certificate transparency, though they increase CT log volume and operational costs.
- Some worry about “effective single‑vendor” risk around Let’s Encrypt; others point out multiple ACME CAs (ZeroSSL, Google Trust Services, etc.), though free/unlimited terms and sales friction differ.
DNS Challenges and DNS‑PERSIST‑01
- DNS‑based validation is important for wildcard/hidden subdomains but awkward due to DNS APIs and security of DNS tokens.
- DNS‑PERSIST‑01 (static TXT record binding an ACME account) is seen as a big win for homelabs and enterprises that currently need tickets for every DNS change; some propose CNAME‑to‑aux‑zone patterns today.
- A few raise security/privacy questions about putting an account identifier in DNS rather than a random token.
Certificate Pinning and Non‑Browser Clients
- Short lifetimes complicate certificate pinning; advice trends toward:
- Avoid pinning to public leaf or intermediate certs entirely.
- If pinning is unavoidable, pin to keys or a private CA you control, and serve separate chains for pinned clients vs browsers.
- There’s debate over reusing keys (easier pinning vs undermining the security intent of short‑lived certs).