Podcast
Root Causes 445: Seven Reasons to Shorten Certificate Lifespans


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
December 9, 2024
We take a deep dive into the seven reasons shorter certificate lifespans are better.
Podcast Transcript
Lightly edited for flow and brevity.
In the private world, you can go to Black Hat and DEFCON and look at some people who've done their private certificate authority setups with, 10, 15, 20-year certificates that are signing their issuing CAs and the bad guy basically saying, hey, I've popped your box, and guess what? I now have your private key. I'm able to do man the middle attacks against all of what you thought were encrypted in transit communications and Tim, if you think about private key compromise, you would want as short certificate lifespans as possible. In the private world today, Tim, in some use cases, we're thinking, we're looking at keys, certificates after key generation that are really only meant to be lasting a period of maybe up to two hours in some DevOps use cases. And there's good reasons for that. I just don't think we can not talk about private key compromise as a reason.
The other thing is that there are CA/Browser forum rules that prevent CAs from issuing to known private keys. There are CA/Browser forum rules that state that as soon as we become aware of a private key we have to view that as compromised. Like even as the CA, I can't know your key, and if I know your private key, I have to call it a compromised cert, and I have to revoke it, even though I'm not going to abuse that. And so when you look at all of that, there's just incredible focus on the importance of maintaining your private keys and rightly so. As there should be.
You know all about the revocation period for that. It's important one. So it's not just, hey, there's a slightly misissued certificate with a United States state that has a capital letter, not capital letter, and therefore it's considered misissuance. Those are sometimes some small things, but there are some major reasons why misissuance happens, and might be inevitable for any CA. I would say that is a reason why you want a shorter certificate lifespan. You don't want those certificates lasting a long time in the future.
So another one, which I think is a huge one, is alignment of certificate ownership and domain control.
So I just talked about this in the episode you and I referenced earlier but let's go through the math on this again, because I think it's worth discussing. Today, the maximum TLS certificate validity period is 398 days. Today, the maximum domain control, DCV reuse period is also 398 days. 13 months + 13 months. So you in theory, could go for 26 months without having to re-DCV a domain. If I DCV on day zero and then on day 397 I order a new cert, and that's a 398 day cert - - So after 13 months, I order a new cert, and I order another cert that's also for 13 months, I could have 26 months later, have a domain that had not had control verified for more than two years. And that's an awful long time.
I want to remind everybody - Tim, it wasn't even you and I who said it. It was people like Bas Westerbaan from Cloudflare. We've had Bruno Couillard say this, and we've had Dr. Dustin Moody say this on this podcast, but we are going to enter a world of more richness in our cryptographic algorithms in the post-quantum cryptography era, and the chance of deprecation is that much higher because we don't know which ones are going to have a long, long life, shelf life, just because of the math. So therefore, cryptographic algorithm deprecation and the need for cryptographic agility only goes up exponentially from here.
So this has been specifically alluded to, at least by the Chrome program as one of the motivators behind shortening certificate lifespans, which is that they recognize, just as the SHA-1 deprecation took too long, they do not want the migration to ML-KEM and ML-DSA, when the world is ready for that, to be longer than it needs to be. And the shorter our certificates, the faster that migration will occur.
OCSP. One of the revocation technologies available to us for certificates that last 398, days and beyond, it has a privacy problem, Tim.
Root causes Episode 272, we go into extreme depth onto the privacy problems of OCSP, and that is the very reason for the establishment of 10- day certificates, Tim.
I think that private key compromise is probably intuitive, although most people just don't think about it. Number two, misissuance – CA misissuance - I think that it's intuitive, but most people it's not in the front of their mind. It's on the front of our mind, because we live in a CA, and I think that as you get to number three, the organization ownership changes, most of you listening to this podcast work for organizations that own a domain forever and never think about that. But if you're one of the browser root store programs, or if you're a CA, you think about this all the time, but the actual, the subscribers to certificates probably don't think about it very much. And until we started to get into post-quantum, most people have forgotten about the SHA-1 deprecation.
And I think even though you and I issued a podcast, our Root Causes Podcast 272, on OCSP privacy problem, most people outside of the hardcore CA - -
So there has been a big problem in the web PKI that we've really seen illustrated this year, where CAs just don't do the revocations that they're supposed to do, and they don't do it because they don't want to inconvenience their subscribers. That's really the reason. And that played a big role in the distrust of Entrust and in general, has been a huge problem in the industry. We've covered this a lot in our Bugzilla Bloodbath series. We've talked about revocation real specifically. This is a giant problem that isn't healing itself.
Now, there is a proposal from Mozilla, which we also recently discussed, that I think would go in a long way towards solving that problem. However, shorter certificates do, too. So earlier this year in the Bugzilla blood bath, when we did our revocation by the numbers, episode, we talked about certs that were still unrevoked 60, 80 days after the precipitating incident.
Well, if the maximum term of a certificate was 47 days, then you can't have any certificates that go unrevoked for more than 47 days. And the average age of those certificates is not going to be over 23 days. And so fundamentally, it just really mitigates that particular problem. Now, as you know, it's a problem that I think should not exist, but also it's a problem that does exist, and we have to face reality on that. And shorter certificate lifespans just go a long way in solving that problem.
I want to I want to have a heart to heart beverage in the lunchroom with every single Linux administrator out there who manually tracks publicly trusted certificates and manually renews publicly trusted certificates. Let's all sit in a lunchroom together with a beverage and talk turkey. Here it is.
But now let's talk about sitting at the command line. Let's talk about sitting at your beloved Linux command line. Look, guys and girls, I know you. I know you. I was one of you. Okay? I still am one of you. And I can tell you right now, if you're not embracing automation right now for every aspect of your job, then you're doing the wrong thing for yourself and the company you're working for.
You're just doing the wrong thing. The right thing is to say to yourself, I'm going to let a computer do this renewal, and my job is going to be to make sure that that renewal happened correctly. And Tim just taught you - you renew every 30 days, and you've got that sweet two weeks of being able to deal with it, with whatever happened. That's why Apple wrote into the proposal what they did. So I don't care how you automate this out. There's so many technologies that are out there. Just pick one and take yourself out of the process. Believe me, there's not an enterprise in the world right now that doesn't value you. You are rare. You are needed, and sitting at the command line doing a manual renewal and manual tracking doesn't make you important. Get yourself out of the business of manual renewals. Please.
And then the other thing, if you want to take away from these seven items that we listed, is the level of commitment to shortening certificate lifespans that you see in places like the browser vendors is very, very high. Don't view this as a passing fancy or something kind of lightweight and diaphanous that they're just going to forget about. This is a very deep conviction that has an organized, rigorous effort over the span of years, and that's how you want to think about this.

