Podcast
Root Causes 292: Validation Data Reuse for 90-day Certificates


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 6, 2023
As the industry explores the expected consequences of 90-day maximum term for SSL / TLS certificates, some are wondering if the allowed validation data reuse period stands to go down also. We explain today's data reuse rules and what the evidence indicates will be required for both domain control validation (DCV) and organization information validation.
Podcast Transcript
Lightly edited for flow and brevity.
So, to do this, first of all, let’s start with a little bit of background. Let’s talk about what the rules are right now, and in order to do that I want to break this into two sets of validation information – what I’ll call DCV or domain control validation, which is authentication of the fact that the person who receives the cert is in control of the domain for which they received the certificate. So, that’s DCV or domain control validation. And then everything else I’m just gonna refer to as OV/EV validation. OV/EV validation. And what that means is that is all of the stuff that we do apart from DCV to validate the organization, its nature and the person who is receiving the cert on behalf of the organization. So, we are gonna put all of that together, lump it all into a single bucket that I’m gonna refer to OV/EV validation. Ok? And that’s gonna make it easier to discuss.
So, today, the rules are that DCV and OV/EV validation both are reusable for 398 days, which is the maximum term that is allowable for a public TLS certificate today. And what this means pragmatically is that I can buy certs and renew them. Right? So, if I get a cert on Day 0 and the maximum term that cert may have is 398 days then that means as I’m coming up on the end of that duration, that term, and I want to do a renewal, data reuse is allowed, which means I get one renewal without having to redo validation. So, I get a cert for 12 months, 365 days, and then when I’m getting close to the end of it, I’ve got 20 days to go or a month to go on my cert, I buy the renewal. We tack that extra time on. So, now instead of 365 days, if there’s 20 days to go, let’s say it’s 385 days. I get another 385-day cert and I get that within the validation period and then a renewal of that cert would require revalidation. Does that make sense?
But if we look at the Moving Forward Together page, I want to read you a specific passage from this page. And this is down in the bottom. It’s the section that’s called Streamlining and Improving Domain Validation Practices. And again, if you want to look for this page yourself just do a search on the following phrase: “Chromium moving forward together.” If you search for those four words, it will be the first thing you see. So you can click on that and you will be right where I am.
So down at the bottom it says Streamlining and Improving Domain Validation Practices. I’m gonna read from this:
“The Baseline Requirements allow for the reuse of data or documents related to previously completed domain validations for up to 398 days. However, with the existing policy requirements in place, it’s possible for a CA to rely upon ‘stale’ information for much longer than this (i.e., a new 398-day validity certificate can be issued that relies on information that’s 397 days old).”
So, if we unpack that first statement a little, what they are pointing out is, in principle, I could do DCV on Day 0 and that could be the last day that I own that domain. I could then turn around and sell that domain and there could be valid active certificates out in the world for that domain for a total of nearly 800 days. Right? 795 days later there could be still be an active cert that was considered legitimate even though 794 of those days ago, that certificate changed ownership. And their basic point they are saying is look, that’s just too long. We understand there will be some period of time where there might be a mismatch between active certs and domains but that’s just too long. It’s gotta be shorter. That’s the basic point that they are making there.
So, if I move back to what they say as a result. “In a future policy update or CA/Browser Forum Ballot Proposal, we intend to introduce reduced domain validation reuse periods, along with a reduction of the maximum allowed TLS server authentication certificate validity to 90 days.” So, in other words, they make it explicit here that they’re going to offer, that they are going to use the same methods that we discussed in our Episode 284 about reducing the term of an SSL cert to 90 days. In that same action, whether that’s a CA/Browser Forum ballot or a root program requirement, they’re also going to bring DCV time down to that same 90 days.
Now, however, you can read this entire page and you are not gonna see any explicit mention of what I’m calling OV/EV validation. Or OV/EV data reuse. It is simply absent from this page. Now I put it to you that if there were an intention on the part of the Chrome Root Store to similarly limit OV/EV reuse that we would expect a reference to that here. The DCV reuse is very explicit. It’s unambiguous. They’re very clear in spelling out what they intend. They’re very clear in spelling out why. They’re just very clear on the whole thing. And to completely omit another important set of validation rules that they do intend to modify and just to not mention them would be extraordinarily sloppy, not at all in keeping with what they are doing and not at all in keeping with why they created the Moving Forward, Together page in the first place. So, that strongly suggests to me that there is no intention on the part of Chrome to make a similar change for OV/EV validation.
Well, first of all, let’s hope that you are automated. Let’s say that you are automated somehow. You are using ACME or you are using a CLM and your certs can be deployed in an automatic fashion. So you don’t have to go and deploy them every 90 days or maybe if you do, what do I do? So, I go ahead and I order an OV or EV cert the way I would today and I get a certificate, and then I can replenish those certificates in whatever timeframe or renew and replace them in whatever timeframe I think is appropriate. I think we talked about in our earlier episode that you are not gonna do it every 90 days because you don’t want to have a potential outage. So, let’s say you are doing them every 60 days or every 70 days or whatever cadence you are on. You can order the new certs. You perform DCV every time, which hopefully is easy. The new cert comes, you deploy the new cert and you don’t worry about your org validation for, probably if nobody changes it, it will be 398 days. That means if I can get through an original order and four replacements if I’m going up to 90 days or six replacements if I’m going every 60 days – every two months – before suddenly I have to go through another validation again. And I think that’s important because it removes a great deal of the potential pain from these shortened certificate durations. The Chrome Root Store isn’t doing this because they want us to suffer. The Chrome Root Store is doing this because they believe shorter lived certs are safer. And to the degree that they can bring about shorter-lived certs, which they believe are safer, without causing suffering, that is a smart thing to do. So, that’s what they are doing in this particular case. By allowing reuse of OV/EV data for the original time period, the degree of suffering goes down considerably while the degree of security risk goes down minimally. And so that’s good bang-for-your-buck math. And I think that’s another reason why I believe that’ll be the case because I think they’re going to look at it and they’re going to come to the same conclusion that I have, if they haven’t already.
Based on that supporting information behind the idea of what I believe which is that you are gonna get your cert, you are gonna be able to run through however many updates you do in the next 398 days. So, in 13 months, you’ll be able to run through whatever you update cadence is and then at the end of 13 months, whether it’s 60 days or 70 days or 50 days or whatever, 2 months, and then at the end of that you’ll turn around and you’ll get another one. You’ll go through another validation and that will last you another 13 months and that’ll be the new going forward cadence for everybody.

