Podcast
Root Causes 33: Prepare for One-Year Limits on SSL Certificates


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 18, 2019
The CA/Browser Forum faces a proposed ballot to limit the maximum duration of an SSL certificate to 13 months. Even if this ballot fails, browsers such as Google Chrome have the ability to simply distrust certificates of longer duration, creating the same de facto situation. Our hosts discuss the trend to shorter certificates, the pluses and minuses of decreased maximum term, and automation as the only solution to fill the gap.
Podcast Transcript
Lightly edited for flow and brevity.
There’s also an idea of Crypto-agility. Probably the best and most famous example is when the Debian OpenSSL flaw came out there were lots and lots of certificates that had predictable keys. And under those circumstances, if those certificates had shorter lifespans there would’ve been less vulnerability. There would’ve been a shorter period of time before those got swapped out. If that person moved to a non-broken form of key generation then they would’ve had a non-vulnerable cert earlier.
The third argument is actually not very important, but some people like to harp on it, it’s this idea that domains and certificates are decoupled from each other. Meaning I could own a domain and I could get a certificate legitimately, that domain then could stop being my property because I sell it, or I don’t renew it. Now somebody else could take that domain and use it, but at the same time I would still own a certificate that in principal was a certificate for a domain I didn’t own. That idea is bothersome to some people, and to the degree maximum certificate lifespans are shorter, all of those factors are reduced.
First of all, I’ve never seen evidence any real attack being dependent on this fact, and I don’t even know how you’d go about engineering that attack. I'm going to get a domain name; I'm going to buy a 2-year cert; I'm going to go sell that domain name to my intended target. Then they’re going to put something valuable on it, and I'm going to go do a DNS poisoning attack so I can man-in-the-middle them, and use my cert. Like, it isn’t going to happen. It’s not reality.
Then the other ideas are things we talked about, ‘what if your key gets compromised?’ and ‘What if you need more crypto agility than we have?’ Those are thought experiment kind of arguments.
We need to have a future podcast about this. Just in terms of where all these certificates need to go, how to time them correctly, how to avoid outages, and talk about what automation really means to a modern practitioner in a complex environment. It’s not just me and my web server anymore.
We’ll keep an eye on what happens and ultimately will let you know if it does go down to one year or not. But even if it doesn’t go to one year now, clearly there’s pressure to shorten the duration of a certificate. If we don’t go to one year in this vote, you can bet that it’s going to come up again. One thing I’ll say is, you’re never going to see allowable certificate durations gets longer. By the way, I wasn’t being facetious before, I do not predict this stops at one year. I think after one year gets implemented and is the universal standard that there will be voices that are calling for these certificates to get shorter than that. Let’s Encrypt by way of example, they’re all 90-day certificates and there are plenty of people who claim that all SSL certificates should be 90-day certificates. In that kind of environment, how are we going to get this done without being heavily dependent on automation? I think we’re not.

