Podcast
Root Causes 442: Apple Proposal to Reduce SSL Lifespan Updated


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
November 25, 2024
Apple has published an updated draft to its proposal for shortening the lifespan of SSL certificates, including a final maximum term of 47 rather than 45 days. We explain.
Podcast Transcript
Lightly edited for flow and brevity.
So two meaningful changes from the original proposal. There's actually a third change, but the first meaningful change is that the maximum term, instead of sitting at 45 days, now sits at 47 days. And I believe the rationale here is that on every one of the stepdown periods - remember, it stepped down to 200 which is six months plus a little, then it stepped down to 100 which was 90 days plus a little, then it stepped down to 45 which was one month plus a little. And I think the point there was to make it more than two weeks longer than the longest possible month. So a month could be up to 31 days long. So if you're on a monthly schedule, you may need 31 days to stay on your monthly schedule. 31 days plus 14 is 45. That's exactly two weeks longer. Apple wanted you to get something more than two weeks so that you weren't going to run into any problems and 45 didn't get there. They just moved it to 47. I think from the security of a cert perspective, if the concept is that shorter certificate terms are better, 47 is two days longer than 45 so by that line of reasoning, it's less than 5% less secure. I think they felt like this is a fine trade off in terms of the security, in order to give people more opportunity not to have this be disruptive.
The second change, which is possibly the more meaningful of the two is that the dates are moved out. So you may recall that September 15, 2025 was the original announced date for stepping down to a six-month to a 200-day term. That has now moved out to March 15, 2026. So March 15, 2026 we step down to 200 days. Exactly a year later, March 15, 2027 we step down to 100 days and then in 2028, a year later, it's actually April 15, 2028, we step down to 47 days. That is the process there.
So really just everything has been pushed out by a quarter. Everything's been pushed out by whatever that's going to be, or, I guess, two quarters. Everything's been pushed out by five months. And that is something that I was always expecting. I'm not sure whether or not we covered this in our Episode 432, but in my mind, I always felt like September 15 was going to come too fast, and that those dates were going to wind up being moved and I'm not at all surprised to see that move occur. I feel much more confident in March 15 as a real date that the industry might really stick with.
I also think it's great that there is a clear progression beyond that. If it was just about to move to six months, then we'd move to six months, and then we'd all know, people are going to get used to six months, and they're going to work out their way to do it every six months. They're not going to really solve it. But even if you're going to get through with six months, that's temporary, because a year from now, it's going to go down to three months. So, you're motivated to fix the problem and view the six month step as a temporary stopgap measure if you're doing it manually, not as the new normal. So in that regard, I think it's all terrific.
Now the next one they change is they change the DCV reuse period. So as I mentioned, and this is one of the things we'll get out in that podcast you just described, Jason, but there is a desire to see the closest possible alignment between domain control and certificate ownership? That's one of the big things that TLS certificates are here to do and to the degree that those are misaligned, TLS certificates are just not doing their job very well. If you look at today's situation, there's a 398-day DCV reuse period and a 398-day maximum certificate term.
So in principle, in theory, I could get a new certificate, do DCV on that certificate, and give up the domain the next day. Sell it, let's say. At which point, I don't own the domain, and then 397 days later, I could order a new certificate for 398 days, and it would be 26 months later between when I gave up control of the domain and when my last validly issued certificate expired. A certificate that was not misissued. I think the browsers are just saying, come on, this is ridiculous. This is just absurd.
The other thing I'll point out again is that the DCV reuse period is matching. It goes, right now it's 398 then both the certificate and the DC reuse at the same time go down to 200 and then they both at the same time go to 100. I think that's about just simplicity of rules. One thing is complicated regulations and complicated rules are easier to get wrong, and they're easier to get wrong unintentionally, just because you made it harder to comply and by matching those up, there is less opportunity for people to get confused about, okay, wait, how many days is DCV and how many days is term? When they're QAing it and when they're writing the code, it's just less opportunity for there to be error. I also view that, when I see that, as a considered decision where Apple looked at the holistic situation and said, look, CAs are going to have to comply with this. They're going to have to build in checks. They're going to get audited against it. They're going to have manual procedures. They're going to have software-based checks, and all of these things are going to be more likely to be gotten right if we keep these numbers the same. So what the heck? Let's just keep them the same.
And then the last one to be cognizant of is there's a reduction in OV reuse period. And so this is the only one that didn't really change, except for the date. The OV reuse period today is 825 day. That's organization validation. That's the stuff about the company.Who are you and where are you located, and stuff like that. That period right now is 825 days, which is two years plus a little and it will go down to 366 days, exactly one year in the longest possible year, starting March 15, 2026. Then in that proposal, it just stays at 366 days from there on out.
The rationale behind that, again, it's matched up at the same time, March 15, 2026. So all the requirements change at once. All the step downs occur at the same time. Keeps it simpler. It's going down to one year because organizations just don't change as fast as things like domains do, and organization validation is heavier than DCV. It's harder on the subscriber and the CA both. I think there's a rationale here, which is to say, look, one year works fine. We're pretty current on what the org is. It gets updated every year because remember, the certs at that point are going to be not more than 200 days long, and they're going to go down from there. So as the certs go down, the opportunity for organization misalignment just goes down and down and down.

