Podcast
Root Causes 432: Apple Floats New Short-lived Certificate Proposal


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 14, 2024
Apple recently floated a draft CABF ballot for commentary that steps down maximum term for SSL certificates starting next year and eventually landing at 45 days in 2027. We share the details.
Podcast Transcript
And then with it, the DCV reuse period would also step down until eventually, in 2027, according to this ballot, it would get down to 10 days. Now, as we've mentioned in the past, DCV reuse is another thing in the moving forward together program that Chrome states that it wants to reduce. So these two things really flock together. And so, why don't we go through the specific dates in the proposal as they exist today?
So the first date is September 15, 2025. So September of next year, the maximum certificate term and maximum DCV reuse period would drop to 200 days. Exactly one year later, 9/15/2026, the maximum certificate term and the maximum DCV reuse period would drop to 100 days. And then on April 15 of 2027 - so considerably less than one year later - the maximum certificate term and DCV reuse period would drop to 45 days. And then the final date is that on September 15, 2027, the DCV reuse period would drop to 10 days. Even though the certificate period would remain the same. So up through April 15, 2027, they're synced up. And then there's one more reduction that comes for DCV reuse.
So let me pause there. There's a little more nuance on this, but let me pause there. That's the gist of the important parts of the ballot, and let you internalize that and ask questions or say what you're going to say.
What the browsers are after in general, is they want a tight marriage of domain ownership to certificate ownership. They really don't like a situation where somebody owns a valid certificate for a domain that they no longer control. That is fundamentally in the browser's mind, just a thing to be avoided as much as we conceivably can. And they talk about scenarios like people don't renew a domain and someone picks it up, or people sell a domain or, and they talk about attacks. Somebody exploits a domain, or exploits a private key. All of these things kind of fit into it. But at the end of the day, there is this desire to have as close as we can, a perfect overlap between who owns a certificate and who controls that domain. And so reducing DCV, the DCV reuse period, gets you closer to that. Ten, five, two, one. I don't know what the right number is in there, but I think it's something in that ballpark. And I think 10 is probably the biggest you might go for. And that might have to do with why Apple went with 10 is just to be as light handed as they can within what they're trying to do. And they could always go back and tighten it up later if it's decided that it needs to be tighter than that.
This 10 day thing has come up in the past. That is the period that according to CA/Browser Forum ballot right now, if assert is not more than 10 days in term, then it doesn't need revocation checking. So that's in the CA/Browser Forum rules. That's in the BRS. So by that line of reasoning, syncing up with 10, maybe it's smart. The fewer arbitrary numbers you have floating around, the less opportunity there is for someone to get confused and use the wrong number. So, if nothing else, there's some virtue just in that. So that may be it. And again, I think if the community determines that somewhere down the road that they'd rather it were three days, it can be updated and it can be reduced to three days. And so I just think that's probably Apple being as light handed as it can in what already is a pretty assertive ballot.
Now these dates - 200 days. 100 days. You might think those are funny days. Funny time periods. Like why isn't it 90 days? And the rationale for that, which Apple explained, was, and I think it's actually absolutely right on. Apple says 200 days is 180 days plus a little bit. 100 Days is 90 days plus a little bit. 45 days is six weeks plus a little bit.
So what they're doing is they're building in the idea of having a little bit of a renewal grace period. This is something that certificates have had for decades, which is, if your certificate is expiring on October 1, what you really want to do is you want to get a certificate from me in September so you can deploy it and if there's a problem, you've still got the old cert. And this is done all the time. It's considered to be a best practice. And by giving us 100 days, you can have 90 day certs that still co-term on your schedule. By giving us 200 days, you could have 180 day certs that still co- term on your schedule, or six months certs, if you'd rather, which isn't exactly 180 days, that still co-term on your schedule. So all of that becomes possible. It gives you a chance to maintain a regular calendar cadence. I'm doing this twice a year on a certain date. I'm doing this four times a year on a certain date without having to worry about you've got a little bit of overlap. You got a little bit of fudge time in there. And this is one of the things that you and I have discussed in a great deal when we talked about the 90 day proposal from Chrome, is that that isn't four renewals a year. It's five or six renewals a year. And so this is Apple accounting for that, and saying, okay, we can build this proposal in a way where the actual cadence you're able to maintain is for a year. And I think that's, what you see going on with those dates. So I've had people ask, what’s up with those time periods? I think that's what's up with it.
So that's an example. And the most clear example we have is current one year certificates are not 365 day certs. They're 398.
So this ballot will bring the OV reuse period from two years down to one year. Now at Sectigo we have a one year limit anyway. We reorg value every year, no matter who you are. So if you're a Sectigo customer, you're used to that, and you've been living it anyway. But not every CA does that, and not every CA has to. So this will reduce that time period.
So that's one thing to know, but the other thing to notice is that there's a DCV step down, but there's no corresponding OV organization validation step down in the program, because one of the questions that I've been asked in the past is, oh, wait a minute, does this mean I'm going to be reorg validating every 90 days? And I've always said there's nothing to indicate that that's anybody's desire. I would say this goes a step forward by showing us the proposal they showed us, and having the DCV, OV and cert term all individually spelled out, Apple is making it pretty clear that they're happy with one year org val, and have no immediate desire to push that further down. And so that's another good thing, just to be aware of that's in this ballot. And I just wanted to get that out there.
Okay, ballots themselves. So this is a, again, this is a proposal for discussion. In principle, a proposal for discussion could sit there forever. In principle, a proposal for discussion could not move forward. Let's say the discussion shows that it's not a good proposal, then you just stop. You don't do anything. There's nothing in the rules that states that a proposal for discussion must turn into a ballot. That said, I expect that this proposal will turn into a ballot, and I don't think it'll sit around for months. I don't think there's going to be like three months of discussion. For a couple reasons. One of which is, it's actually a fairly simple proposal, and I'm not sure how much people are going to say that's really going to be constructive or contributory.
So when we were looking at something like MPIC, it was very complicated. There was a lot going on. It's very complex. It took a long time to work it through. Sometimes these things are very complicated, and they took a long time to work through. This is just maximum term and a schedule. So there's not a lot you're going to comment to. You're going to say, well, instead of 200 days, I think it should be 205 days. Or you're going to say, well, instead of September 15, I think it should be August 15. That's the kind of thing that people are going to discuss. How much discussion is there really to have there? I don't think there's a lot.
Also, this went up last week in a very public way in front of the entire CA/Browser Forum, and there has been very little commentary so far. So I don't think that there's going to be a great deal of commentary on this. I don't think there's a lot to say. And the biggest thing that we're probably going to hear from some people is, I don't like this, and they're going to be people who don't want to automate. I don't like this. And I don't like this - like, there's not a lot of dialog to be had around that. There's not a lot to investigate. So I don't think this is going to be a super long commentary period. I don't expect it to last for months. I expect it to last for weeks, and then at the end of that commentary period, with maybe some minor adjustments, I expect there to be a ballot. Now to be clear, full disclosure, Sectigo has already endorsed the proposal that Apple put out there. So you think you know what my opinion is, but, we'll see what the proposal of this is, and then I think that it goes into a ballot within the next month.
It's kind of like a lot of parliaments. There's two bodies. One body is what we call certificates consumers, which you and I usually use the word browsers. But it's not just browsers, like Cisco's in there, for instance. It's anybody who has a root store that uses certificates. The other body is the CAs - the people can issue certificates, and both bodies have to pass a ballot, just like in a lot of parliamentary systems, and if one of them doesn't, the ballot doesn't pass. So in the earlier certificate shortening ballots that we looked at when we're trying to go down from two years to one year, about four years ago, the browsers kept passing them and the CAs kept rejecting them, and at the end of the day, Apple made it a root store requirement, after which Chrome and Mozilla followed suit, and then at that point, we passed the CA/Browser Forum ballot.
So it is very possible that this ballot fails because we cannot drum up a majority of support among CAs, and if that occurs, it is also very possible that one or more of the root stores does something the same as what Apple did four years ago. Now we are in support of this, as I said, because we just think it's healthier for the WebPKI. We think these long lived certs cause a lot of problems, and there are solutions for that.
It just makes me feel more confident that we will have a successful program of shortening lifespans. That's it.

