TLS证书有效期将正式缩短至47天
TLS certificate lifetimes will officially reduce to 47 days

原始链接: https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days

苹果公司正在推动缩短TLS证书的生命周期,最终目标是在2029年3月15日之前将其最大期限缩短至47天。这一变化基于CA/B论坛的建议,旨在通过强制更频繁地重新验证证书信息并减轻证书吊销系统(CRL/OCSP)不可靠性来提高安全性。 47天的期限并非随意设定;它是将较长的期限分解成月度块得出的结果。虽然手动重新验证在技术上仍然可行,但相关的10天域名验证重复使用限制将使自动化成为避免中断的必要条件。 尽管需要更频繁地更换证书,但成本预计不会上升,因为订阅是按年度计算的,并且预计自动化将在2029年之前得到广泛应用。像DigiCert这样的证书颁发机构已经在提供自动化解决方案(Trust Lifecycle Manager和支持ACME的CertCentral),以帮助用户适应这一变化。此举最终通过简化证书管理和增强安全性来优先考虑数字信任。

Hacker News上的一篇讨论围绕着TLS证书有效期将缩短至47天的新闻展开。用户trothamel询问了在当前使用主服务器处理请求和复制证书的情况下,如何跨多个服务器更新Let's Encrypt证书。回复建议使用Certbot、Caddy或Traefik等工具来自动生成证书。nullwarp推荐使用DNS验证进行续期,避免互联网暴露。同时分享了一个Let's Encrypt关于提供6天有效期证书的公告链接。 随后讨论转向了缩短证书有效期背后的原因。一些人认为这是为了强制自动化,另一些人则怀疑是为了限制被入侵或恶意证书颁发机构(CA)的影响。一位用户认为这种改变是平台资本主义,旨在打压草根互联网。

原文

Why 47 Days?

47 days might seem like an arbitrary number, but it’s a simple cascade:

  • 200 days = 6 maximal month (184 days) + 1/2 30-day month (15 days) + 1 day wiggle room
  • 100 days = 3 maximal month (92 days) + ~1/4 30-day month (7 days) + 1 day wiggle room
  • 47 days = 1 maximal month (31 days) + 1/2 30-day month (15 days) + 1 day wiggle room

Apple’s justification for the change

In the ballot, Apple makes many arguments in favor of the moves, one of which is most worth calling out. They state that the CA/B Forum has been telling the world for years, by steadily shortening maximum lifetimes, that automation is essentially mandatory for effective certificate lifecycle management.

The ballot argues that shorter lifetimes are necessary for many reasons, the most prominent being this: The information in certificates is becoming steadily less trustworthy over time, a problem that can only be mitigated by frequently revalidating the information.

The ballot also argues that the revocation system using CRLs and OCSP is unreliable. Indeed, browsers often ignore these features. The ballot has a long section on the failings of the certificate revocation system. Shorter lifetimes mitigate the effects of using potentially revoked certificates. In 2023, CA/B Forum took this philosophy to another level by approving short-lived certificates, which expire within 7 days, and which do not require CRL or OCSP support.

Clearing up confusion about the new rules

Two points about the new rules are likely to cause confusion:

  1. The three years for the rule changes are 2026, 2027, and 2029, but the gap between the second set of years is two years long.
  2. As of March 15, 2029, the maximum lifetime for a TLS certificate will be 47 days, but the maximum period during which domain validation information may be reused is only 10 days. Manual revalidation will still technically be possible, but doing so would be a recipe for failure and outages.

As a certificate authority, one of the most common questions we hear from customers is whether they’ll be charged more to replace certificates more frequently. The answer is no. Cost is based on an annual subscription, and what we’ve learned is that, once users adopt automation, they often voluntarily move to more rapid certificate replacement cycles.

For this reason, and because even the 2027 changes to 100-day certificates will make manual procedures untenable, we expect rapid adoption of automation long before the 2029 changes.

Apple’s statement about automated certificate lifecycle management is indisputable, but it’s something we’ve been long preparing for. DigiCert offers multiple automation solutions through Trust Lifecycle Manager and CertCentral, including support for ACME. DigiCert’s ACME allows automation of DV, OV, and EV certificates and includes support for ACME Renewal Information (ARI).

Get in touch for more information on how you can make the best use of automation.

The latest developments in digital trust

Want to learn more about topics like certificate management, automation, and TLS/SSL? Subscribe to the DigiCert blog to ensure you never miss a story.

联系我们 contact @ memedata.com