Anyone read this 49 day SSL expiration thing and think they would rather just retire?
Posted by HJForsythe@reddit | sysadmin | View on Reddit | 1012 comments
The idea that some random group of folks decided that SSL certificates need to expire every 49 days and that everyone else is supposed to go along with it is probably the craziest thing that has happened to technology in the past 20 years.
reodesuxz@reddit
I get what you're saying about the 49-day expiration being a bit nuts. But Certbot does work with other CAs beyond Let's Encrypt; it's just that Let's Encrypt is the most commonly used one. Godaddy and others do suggest using Certbot because it simplifies the process, even if it's not a perfect solution. Still, I see your point about addressing the root issue.I get what you're saying about the 49-day expiration being a bit nuts. But Certbot does work with other CAs beyond Let's Encrypt; it's just that Let's Encrypt is the most commonly used one. Godaddy and others do suggest using Certbot because it simplifies the process, even if it's not a perfect solution. Still, I see your point about addressing the root issue.
reodesuxz@reddit
*Investigation: Wow! This is the 1000th comment!
patjuh112@reddit
It takes less days to decrypt. Easiest solution? Lower validity time
NH_shitbags@reddit
They should just expire every 1 day, that would obviously be the most secure approach.
HJForsythe@reddit (OP)
Why not just have it regenerate the certificate for each request? Surely that is where this is headed.
Mixed_Fabrics@reddit
Multiple certs per request, just to be safe…
HJForsythe@reddit (OP)
one for each packet
CandylandRepublic@reddit
At every SerDes, in every microservice component!
Mechanical_Monk@reddit
Better add certs to each of the certs' packets too just to be safe
xendr0me@reddit
Each user of every website should have PKI enforced and you have to apply for access with your government issued ID and in return the site host will send you out a pre-provisioned smart card and USB contactless reader for $99.95. Of course this card is only good for a single login, but hey, you can just reapply next time you want to visit ESPN.com
shenan@reddit
Get behind me, Satan!
randalzy@reddit
AI-generated blockchain certificate!
enroughty@reddit
Someone promote this guy to upper management!
cdoublejj@reddit
why even use cert at all? make a new standard with rolling keys
alter3d@reddit
We just need to implement RFC 3514.
throwawayPzaFm@reddit
In some places this is nearly a thing. You get certs valid for the duration of your login.
There's nothing magical about automating certs, just ask codex to do it for you if you really can't.
thortgot@reddit
Until you come against the several dozen scenarios in cases where it can't be done.
throwawayPzaFm@reddit
Sure. Then you send an email to management and they can decide on whether to implement something better or pay you or someone else to keep doing it.
Costs for legacy crap come up all the time. Your flair tells me you're aware of this.
thortgot@reddit
The frustrating thing to me is the incremental security between 90 days and 49 days for a cert being compromised is fairly pointless.
If the argument is we need unique keyed certs to avoid compromise attacks then we should be focusing on DANE which actually solves the problem instead of ugly solutions like max expiry length.
I'm sure CA attacks have happened but they are largely theoretical risks rather than practical.
PQC attacks are a much more practical risk but we don't see remotely the same pressure for everyone to update algorithms.
NH_shitbags@reddit
Well yes, clearly the most uber-secure way of doing it for sure!
JwCS8pjrh3QBWfL@reddit
TLS-OAUTH lol
skyb0rg@reddit
I mean this is essentially what OCSP stapling is.
NoSellDataPlz@reddit
Exactly. Take the horseshit arguments of “security” to their natural endpoint… certs that are created and destroyed on-the-fly… but then that eliminates a need for certs because if someone’s login gets compromised, then the cert doesn’t do anything to protect them. Reasonably, certs are fairly useless and pointless. Instead of punishing us grunts who’ll be doing the work, how about building a better way to prove trust and authenticity? But then the CAs would have to take responsibility for it, and that’s costly. Nope! We’ll push the cost on to the consumer and make it mandatory! Know what that’s called? Antitrust. “You can’t live without the Internet, but you can’t use the internet services unless the service has a certificate which only we can provide… oh, and it costs money to get a certificate so… pay up”.
Cyhawk@reddit
TBH Thats your fault for doing actual work beyond configuration. Certbot is free, automation is free, reverse proxies are also free. The only part of certs that aren't free and automated is the domain name itself.
Its not 1999 anymore, you can do these things without paying someone a penny. All it takes is a bit of knowledge and a bit of time.
thabc@reddit
We use 6 hours for our internal certs.
romu006@reddit
You're kidding, but I'm pretty sur the final goal of some the CA/B actors is to have 7 days certificates
OverdueBoring@reddit
Let's Encrypt does offer 6 day certificates. I know you're being sarcastic, but much shorter lifetime certificates are being done. We don't use these, but going to shorter lifetime certificates has significantly reduced the amount of audit information we need to provide regarding handling revoked certificates. The 6 day certificates don't even include revocation information.
8BFF4fpThY@reddit
I'm in. I'll renew every 6 hours and won't notice a difference.
aitorbk@reddit
Every 5 minutes, even safer!
Virindi@reddit
TLS certificates were originally sold to imply both encryption and trust... but a certificate only proves domain control at the time of issuance, which is a fundamental flaw. They tried to solve it with CRL (Certificate Revocation Lists), which, depending on the cert issuer, had serious capacity and reliability issues. They tried to solve the CRL problems with OSCP (Online Certificate Status Protocol). Shortened lifetimes seems to be a duct-taped solution: we haven't solved the underlying problems, so the best we can do is shorten how long those problems persist.
DANE solves some of these problems but it's not widely supported yet.
Yeseylon@reddit
Since you actually seem to know things... Which "random people" decided 49 days was best practice for SSL certs? NIST? PCI?
Virindi@reddit
It's decided by the CA Browser forum. The membership list is reasonably long, but there are some big names there: Apple, Amazon, Cisco, DocuSign, GoDaddy, Google, Microsoft, Mozilla, Sectigo, Visa. The membership list is split into "Members" (Producers of certificates) and "Consumers" of certificates so that the conversation has representatives from both halves (cert creators and cert consumers).
Ballot SC-81 v3 maps out the timeline:
They want 30 day certs; the extra 17 days is to give people a buffer for two consecutive weekly update failures, plus a couple days. They're also shortening how long CAs can "cache" domain validation. Today, they only have to do it once for the lifetime of a 1 year certificate. In 2029, they're only allowed to cache for 10 days. That doesn't mean they're required to constantly validate every 10 days though, it just means when you try to renew your 47 day certificate, if the last validation was >= 10 days ago, they're required to re-validate.
If you crystal ball the future, I think it's clear they're abandoning the idea of CRL and OSCP and leaning into using certificate expiration as the "control" for compromised certificates. If I had to crystal ball it, they'll keep proposing shorter and shorter lifetimes, perhaps ending up with 24 hour certificates in 10 years (but that's not official and not even being discussed, just my guess).
ocdtrekkie@reddit
The CAB is an organization structured to ensure complete unaccountability: Each organization's leadership generally assumes their CAB rep is the expert, so nobody will question them at each company that employs them, and at each organization can largely fall back on "everyone else voted for it".
But it's also important to understand the CAB only has three members that matter: Google, Microsoft, and Apple. Because what they decide to implement (often unilaterally!) must then be followed by the entire CAB, and is approved by the entire body. I believe in this case Apple unilaterally decided it was going to start rejecting longer lifetime certificates, which meant everyone else had to fall in line if they wanted to sell certificates that worked on the iPhone.
The CAB is full of people who have a hammer, and think everything in security can be solved with a nail, and structurally there is nobody out there that can tell the CAB no.
I'm actually glad they're doing this 47 day nonsense, because it is going to accelerate Internet breakage so badly, the CEOs of Google, Apple, and Microsoft will have to find out what happened, find out they have some person in charge of that who voted for it, and finally promptly fire them for costing their customers billions of dollars in damages.
CandylandRepublic@reddit
If anything that's a collusion lawsuit, but nobody is going to get fired for any of this. It's working like intended, by the big guys.
PowerShellGenius@reddit
I agree it's broken. But what other system do you have in mind?
Keeping in mind pervasive surveillance is one of the top threats TLS is designed to withstand, and a government based solution would NOT revoke CAs caught issuing certs to spooks for domains spooks don't own...
ocdtrekkie@reddit
First of all, the entire Let's Encrypt/ACME system is an insane way to work around using DANE just to keep the CA/B in a position of control over the web. It's already DNS authenticated but most people don't realize their DNS/domain registrar is actually their most important account to secure. We should be using DANE.
Second, we need to reestablish support for EV certificates with clear country of origin indications and improved policies for validation and criteria for notability. (Not everyone should need one, it's okay to make them unavailable to most customers!)
The fun part is that these two things are both outright unsupported in the browsers which control the CA/B!
Certificate lifetime needs to go away as a critical signal, it is at best a warning we should put a small indicator for in the address bar, not a realistic reason to ever block access. HSTS mostly needs to be deleted, but CAA records need to be much more heavily promoted.
PowerShellGenius@reddit
I agree with a lot of that, but the one issue with DANE as compared to ACME DNS-validated certs is: what replaces CT logs?
Currently, you are entirely correct that if you control DNS you can get a cert for a domain anyway, so from a basic "security is just about preventing an incident" view, it is already security equivalent to DANE with needless complexity and expiration thrown in.
But when you recognize that there will always be incidents, cases where someone can trick, hack, game, or coerce the system - and that ensuring incidents will be detected and responded to is also a key part of security - you see that CT logs serve a critical role.
All of the following are legal entities, some of whom are subject to coercion from [insert your least trusted countries here], as well as full of social engineering susceptible humans and other security holes:
So whether you are verifying domain ownership (by ACME, or DANE, makes no difference), or legal identity via OV/EV, the system is not perfect. It can be tricked, hacked, coerced or otherwise subverted. Someone can hack your DNS registrar, be a malicious insider there, do a large scale DNS poisoning attack like foreign threat actors can, or have an unconstitutional secret warrant for your DNS registrar, or even impersonate you to your secretary when telling them to accept the EV cert validation call at the front desk.
However, the current web PKI ensures that these incidents will be caught and brought to light.
Under your proposed replacement of DV certs with DANE, how would I as a website operator know that the public DNS has (due to technical, social engineering, or coercive reasons) lied to a client about what my site's key is to facilitate a man in the middle attack against a user of my site?
Under today's ACME+DV certs web PKI, if the MitM cert was published in the CT logs I would know, and if it wasn't, browsers would reject it.
ocdtrekkie@reddit
I don't have a strong objection to CT logs, though I know of nobody who has ever monitored them ever. ;)
I will say generally I would rather we move more towards long-lived certificates so we can warn when suddenly you (or your browser's infrastructure) unexpectedly sees a new one, than both constantly rotating certificates which seem no more or less legitimate than the last one and needing a constant log of rapidly rotating certs.
One vendor I use rotates their certificates every 24 hours... and I am very unlikely to notice if today's certificate is oddly different than yesterday's. (Their site also breaks a lot due to certificate errors, unsurprisingly.)
In decades of IT experience, I have yet to ever encounter a browser certificate error in the wild due to an actual security compromise as opposed to simple forgetfulness or now broken automations.
tankerkiller125real@reddit
I've been rotating certs every 80ish days for 4 years without failure... The fact that so many people think it's a burden, or will result in massive internet failures have very clearly never automated a single important thing in their life, or have simply failed to do any fundamental research into how to solve their niche issues with legacy garbage they should have replaced 2 decades ago (HAProxy is probably the solution 90% of the time)
CubesTheGamer@reddit
It must be nice to not have to deal with government or financial sector. Glad you’re happy.
Meanwhile those of us that manage actually important systems that we cant just use proxy or complain to a vendor, are going to have to manually update certs in some jank ass custom certificate store that only accepts a specific format of PEM file or uses some EXE to load it that prevents any form of automation.
Haplo12345@reddit
Or, they're just too busy doing all the other aspects of their job to be bothered with a largely unnecessary artificial constraint as "UPDATE YOUR CERT EVERY TIME YOU WASH YOUR CAR".
darkmannz@reddit
Interesting to note that is also the big companies that are capable to implement this with the systems, people and maturity of automation that have supported bringing this in. The little companies which no doubt out number them have missed out, did they have a voice in this?
ocdtrekkie@reddit
This is a feature of this system, not a bug. Google and Microsoft are strongly in favor of you having no option but to use their cloud services and let them manage your certs for you.
Acct4SrsBsns@reddit
You are more optimistic than I, hoping that if things get bad enough they'll have to acknowledge and fix the issue.
They'll just double down and duct tape more stuff to it at best, or just completely ignore it and move on because it's someone else's problem.
sionescu@reddit
Loads of bullshit.
iamabdullah@reddit
Except that's not going to happen.
tankerkiller125real@reddit
Should be noted that Apple is the one who initiated the 49 day expiration vote.
The_Original_Conman@reddit
ThanksApple
R-EDDIT@reddit
Was it apple or Google this time? Also who yeeted client auth?
Xzenor@reddit
That was definitely google. But why is that a bad thing? I mean, yeah it's fucking annoying now because not everyone understands the difference but in the end it's more secure and more clear. One cert. One purpose
gordo32@reddit
Don't forget at least 9 US govt staff are on there too (CISA, Navy, OMB, and others). Might be more now as last time I checked was probably more than 18 months ago.
Since root certs are controlled by US org, how trustworthy do you really think the certs are on an international scale?
tankerkiller125real@reddit
Given that there are Chinese CAs, Swiss CAs, etc....
It's almost like one should do their research on how many CAs exist and where they're located before trying to spread weird conspiracies that certificate infrastructure isn't secure.
PowerShellGenius@reddit
I think instead of a padlock, the flag of the country the CA is based on should appear in the browser.
With an interstitial warning if the domain is a ccTLD for a country that isn't on great terms with the country the CA is based on (e.g. visiting a .us site with a cert from a Chinese CA or a .cn site with a cert from an American CA)
gordo32@reddit
Sure there are CAs, who charge $$ per-cert, and their automation is (mostly) abysmal.
Privacy_is_forbidden@reddit
Why is 47 days enough? shouldn't it be only valid for a nanosecond or even less?
oh wait, the technology needs to be replaced and we're forcing shitty solutions instead of properly replacing this with something better.
lordpuddingcup@reddit
So single day certs by 2030 and 1 minute certs by 2031 lol
NoPossibility4178@reddit
Our monitoring tools alert at 45 days, some at 90 days when certificates are gonna expire. 😂
ThatITguy2015@reddit
Thank you for linking that. I was more “if you want to retire now, just wait until you see what they want to move to after”.
Moocha@reddit
The Certification Authority/Browser Forum. It's 47 days, not 49; Google proposed 90 days, Apple proposed 47, and everyone went with Apple's schefule. Digicert has a good overview of the schedule on their site here.
hellomistershifty@reddit
Lol what is that calculation? It makes less sense than just choosing 47 days out of a hat
Ripsoft1@reddit
At 47 days, who needs automation! I have a job for life. I can even squeeze in a holiday…😂
Xzenor@reddit
A month with some extra time in case validation is fucked
Moocha@reddit
It does have some logic:
iamabdullah@reddit
It's to manage failure (2 weeks + a few extra days).
SnooDingos72@reddit
Digicert is nothing but Verisign passed down from Versign PKI/SSL to Symantec to DigiCert. Digicert has been loosing the market share & never had any innovation.
Any of these big one's (Google, AWS, Neo clouds) will provide free SSL as long as you host it in their cloud. The same way Microsoft killed Netscape. The same fate is happening to Digicert now...
Haplo12345@reddit
Got it, so we're all on team screw Apple, then, right?
jameson71@reddit
Cert vendors. Same folks who convinced all the suits that every internal network port needs a signed cert no matter what.
cheese-demon@reddit
are you under the impression that webpki has anything to do with 802.1x
jameson71@reddit
Nope
yonasismad@reddit
> TLS certificates were originally sold to imply both encryption and trust... but a certificate only proves domain control at the time of issuance, which is a fundamental flaw
This only applies to DV certificates. You could also pay for an EV or OV certificate. Like DV, DANE doesn't seem to prove much more than that you had access to the domain. I think DANE only prevents a rogue trusted CA from issuing a certificate for your domain.
Interesting_Yam_3230@reddit
Remember when browsers turned the the address bar green for a site running an EV certificate? Mozilla and google killed that off too
retornam@reddit
EV certificates were unnecessarily expensive and not worth the effort. This was because Certificate Authorities (CAs) used the "green bar" to charge more for certificates that were technically identical to regular ones, except for some background check validation that the CAs themselves performed poorly.
chris77982@reddit
You'll find that a lot of corporate proxies won't re-encrypt traffic with EV certs, they'll just leave the connection encrypted. Mean important stuff like online banking isn't being compromised
retornam@reddit
I think your understanding of TLS and the CAB Forum requirements for TLS certs is flawed because none of that you said is true.
If you are certain it is link me to a line in the CAB Forum baseline requirements or any TLS RFC that makes this claim.
chris77982@reddit
It's my experience in various jobs over the last few decades. The corporate proxies would inspect most ssl/tls traffic, and re-encrypt with a corporate signed certificate. They wouldn't be configured to inspect and reencrypt EV certs.
retornam@reddit
There is no standard that prevents TLS inspection of EV certs like normal TLS traffic.
chris77982@reddit
No one said there was a standard. You'll find I said "a lot of" not "all"
retornam@reddit
I’m not sure why you commented then or what you wanted to point out. Extended validation certificates (EV certs) are quite similar to traditional certificates, except for the extended validation bits. They are not more secure and are not impossible to inspect with TLS.
The fact that some corporate proxies selectively ignore EV certs for inspection does not mean that all corporate proxies do so.
Sacro@reddit
Not necessarily poorly, but there were issues when the person buying the certificate was verified, but still not the actual person you thought or wanted. Nobody seemed to realise company names aren't unique worldwide for example.
The_Original_Conman@reddit
I forgot about that! It's been a while since I've seen a green address bar now that you mention it!
TaliesinWI@reddit
I'm old enough to remember when EV _was_ the only choice (but they weren't calling it that yet, it was just "getting a cert".) Back when Thawte and Verisign were the only two choices.
wenestvedt@reddit
And paying $1500 for a string of alphanumerics just for the privilege of that little green lock icon!
rphenix@reddit
Ahh the automated phone call that you had to answer lol fun times.
TheManInOz@reddit
Is DANE the same or similar to CAA? As we implemented CAA recently which is to prevent rogue CA issuance
Leasj@reddit
Yep they actually call and verify everything when ordering a EV cert
Virindi@reddit
You're right, and I should have reworded that slightly. People generally associated the "lock icon" and use of SSL at the time to mean the site could be trusted, even though only DV certs actually went through the basic verification process.
RBeck@reddit
The problem is 49 days is not a lot for a valid cert and a whole lot of a compromised one.
CubesTheGamer@reddit
Yeah kind of ridiculous you ask me. They need to just use CRLs and suck it up and accept connections will take a little longer.
LostComplaint670@reddit
Why have a delay? With a 49 day issuance period, you only need to hold 49 days (at most) of revocations. Just have browsers download them centrally in the background.
Lost_Term_8080@reddit
"They" includes developers and software companies all over the world with customer demands for performance and reliability that can't be forced to do revocation checking.
It also does nothing to deal with the problem of organizations that issue wildcard certificates then leave the certificates and private key passwords in non-secure and/or non-auditable locations. If certificate pinning were made a requirement, this would have significantly mitigated the threats, but it also breaks CIO favorite sales pitch feature in security solutions of SSL inspection
derefr@reddit
Does it? I'm surprised the CIOs weren't working with Google on this, to get Chrome to support GPOs / MDM policies that feed it custom OCSP overlay information (or to talk to custom OCSP gateway servers that can themselves be MITMed, if that's easier.)
derefr@reddit
I presume the initial rule is meant to be transitional: just short enough to force people to eventually automate, but just long enough that you could get away with not automating right away if there's some big problem in the way of your doing so.
Once the majority of SSL issuance is automated, there'd be no reason to not crank the expiration interval down lower.
(Consider that LetsEncrypt themselves are kind of in a long-term transition: their CN=FQDN certs are 30-day, but their newer CN=IP-address certs are 7-day. I'm guessing, once their ACME-server metrics begin to reflect a solid picture of several nines of bug-free auto-renewals, they'll propose shifting to 7-day expiration for their domain certs too.)
Lost_Term_8080@reddit
Its better than 3 years
conception@reddit
Well, I think the goal is 10 days or something, so don't worry about that!
freshjewbagel@reddit
miss by an inch
Internal-Editor89@reddit
I wish I had read this comment a few weeks ago. I was banging my head against the wall questioning why our internal KPI was not able to give any indication about expired certificates. Except it could and it's just that the browser or even OS no longer seem to care or even verify.
CubesTheGamer@reddit
Isn’t domain control at time of issuance kind of..fine? Usually domain registrations last for at least a year. If they really care about that they should do a registrar lookup to see when your domain expires, and allow the cert to go up to a year, or when the domain expires, whichever is sooner.
kkipple@reddit
Great post. Also +1 for an Asheron's Call reference in the wild.
not-hardly@reddit
This is the difference between compliance and security.
Szeraax@reddit
Really would rather see a WEB of trust approach. Every site get certs from 2-3 issuers. Then they pack them all into 1 file and that's what they offer. Browsers already have a LARGE number of issuers built in and so do OS's. Any cert that only has 1 sig gets a warning for the user. If you have 3 certs packed in there, you can have 1 completely fail and still no user impact. Nice to catch and rotate. Obviously doesn't solve the 49 day problem, but its the whole "cert expired" experience loads better and helps prevent against compromised CAs.
lordpuddingcup@reddit
The real issue is for 99% of average people all an ssl cert is is that the damn https is encrypted they don’t care about if the cert was bought by a company or what
I can get a fuckin ssl for any domain I own that similar to another and phish the ssl doesn’t protect that so for the average user who will never actually open and look at a ssl cert shorter cycles does fucking zero
retornam@reddit
DANE is not worth it and this post goes into why in detail https://sockpuppet.org/blog/2015/01/15/against-dnssec/
FortuneIIIPick@reddit
Checking revocation lists was also a privacy hit since it told the CA's which sites users were visiting.
SimplifyAndAddCoffee@reddit
I knew an old lady who swallowed a fly.
Anyway, now we have the modern internet.
lundrog@reddit
That sounds like a nightmare
code_monkey_wrench@reddit
I think you're supposed to automate via certbot or similar.
They are trying to make it uncomfortable enough that people will automate it.
admlshake@reddit
yeah but what about the things you cant?
jspears357@reddit
Put those behind a reverse proxy that does support automating the cert update.
shulemaker@reddit
Front it with a reverse proxy or LB that can.
streetmagix@reddit
Complain to the vendor to get an upgrade or put it behind a reverse proxy
Traemandir@reddit
+1 for reverse proxy
There are a couple services I host in containers that I could not certbot (or at least could not certbot very easily), so I put these behind a Caddy container running as the reverse proxy. Running a reverse proxy with automated Let's Encrypt is surprisingly easy using Caddy.
bobdvb@reddit
I know platforms that serve millions of users and that's how they do it.
TLS termination, in that case inside the private network VPC you don't need TLS, but the clients need it. So you terminate the TLS at the load balancer, or CDN, and then the load is reduced on the service itself.
Single-Virus4935@reddit
you should use (m)TLS internally but your reverse proxy should be able to verify the internal CA ;-)
Thats the basic zerotrust and makes lateral movement or the life of internal attackers harder.
againstbetterjudgmnt@reddit
Yeah, E2E. Don't run unencrypted, even internally.
redd1ch@reddit
This. To get certs for some legacy IMAP or xmpp servers not passed through our reverse proxy and the containerized stack (Traefik), I have set up "fake" containers to trigger Traefik to fetch certificates, and some cronjobs to extract the certs from the Traefik container and deploy them into the legacy systems. Not pretty, but works until they are outdated.
singulara@reddit
ahh that's clever.. a proxy in the normal sense of the word. We got around this using pfsense built-in ACME client, which can run post-renewal scripts which drops them in the legacy client's hardcoded cert path. Convoluted but if that's the only way it's the only way!
lazyhustlermusic@reddit
Just load balance too while you’re at it
Cyhawk@reddit
Luckily enough, nginx can do both of those things at the same time. Super easy to setup.
ThemesOfMurderBears@reddit
I can't tell if I am in /r/sysadmin or /r/homelab.
EraYaN@reddit
Caddy will run huge production workloads just fine as will nginx or haproxy. And you’d be surprised how many customers you can have with a single binary in a single container.
Lendios@reddit
Exactly what I did too, works great using cloudflare
coolbeaNs92@reddit
Same. We do this via AWS and the certs are all self-managed and automatically renewed. This in my opinion is how it should be done.
Ultima_RatioRegum@reddit
Same, I use k3s+rancher (slowly replacing docker swarm) behind OPNSense+caddy+ACME Client with the Namecheap API plugin. It's just a homelab and took me about 20 minutes to automate cert renewal via Lets Encrypt, but I do get that it's easier automating a few wildcard certs than tens or hundreds of certs across multiple domains.
DB-CooperOnTheBeach@reddit
I remember helping someone put their old websphere server behind haproxy because the server only supported SSLv3
Kraeftluder@reddit
Lol, my last ancient Websphere (on effin Netware) server went away in 2021 thankfully.
grampybone@reddit
Not IPX I hope?
Kraeftluder@reddit
Internally? Absolutely. Some old taxi software bullshit. I only managed the server itself. Swapped the hardware before it failed. In 2021 I stopped almost all side gigs and made them migrate to a cloud solution. The Websphere server was Netware 5.1 and there was remote IP-KVM so I could at least VPN in and do everything remotely. There were also NW6.5 file servers with ancient GroupWise versions.
I miss managing that sometimes but then I quickly remember that this taxi company operated 24/7 which made everything effin impossible.
fumar@reddit
Vendors are absolutely going to put the part of the API for certificates behind a pay wall or a higher tier like they do for sso.
mixduptransistor@reddit
Then don't buy it. It's a free market, and if you don't spend your money with them they'll change their ways
fumar@reddit
Easier said than done when you aren't the team that uses the tool.
mixduptransistor@reddit
Then tell the team that is buying it updating the certs is their responsibility
fumar@reddit
Yeah Jan in accounting will get right on that.
mixduptransistor@reddit
It's actually not a hard problem to solve. You, as the technical leadership in the company, set minimum standards for the software you buy. One of them can be, must support certificate automation. If they put it behind a paywall, then it's on whoever is paying for the software to decide if the price that meets the minimum standards is worth it. If you're letting accounting buy software without you having any input at all as to the technical details you're doing it wrong
MBILC@reddit
In a perfect world yes, but reality is often IT does not get to dictate what software a company uses, they can advise, but they do not get to make the final decisions.
They might be lucky to get it mentioned to them if it requires actual configuration, but with so many products now all SaaS, all IT gets is a "We need to be able to log in with our work accounts.." to then find out they did not pay the SSO tax and can't even do it..
mixduptransistor@reddit
Then your company is broken. IT absolutely should get to dictate minimum standards on things that are important. There is a balance and you shouldn't be telling accounting they can't buy some software because of superficial things or you don't like how it does accounting but for material security and manageability of the applications, you should set minimum standards
It's silly to say that the industry overall should have lower security standards because some companies have broken processes. That's the whole reason behind pushing these boundaries, to force laggards into more secure postures
MBILC@reddit
News flash for you, then 90% of companies are broken...
I agree with you, IT/Security should be in the initial conversations, not the Execs or sales people or whoever only, as they get sold on shiny marketing slides.
But again, reality is, most companies do not actually listen to IT and what they have to say. This comes from 10+ years working in MSP's across many industries, as well as in house roles early in my career. New tool comes along, it gets throw over to IT to implement ASAP.....and then we get to deal with it...
Luckily now, where I am, everything comes across my desk, so to speak, because I built that trust and can clearly explain why IT needs to be involved and they get it.
pixelpheasant@reddit
This is the way.
Make actual opex the full operational cost, software plus all services necessary to run it.
slonk_ma_dink@reddit
That's how we fixed Microsoft and Oracle!
HJForsythe@reddit (OP)
Not mentioning broadcom here seems like a misstep so also Broadcom
mixduptransistor@reddit
I mean we don't buy Oracle because they're shitty so yeah it works
MBILC@reddit
Just like the "SSO tax"
Sudden_Office8710@reddit
Certbot and ACME are open source and all the CAs are adopting what Lets Encrypt has had for years
adoodle83@reddit
There’s more to internet traffic than just HTTP. Most things don’t place nicely with reverse proxies
narcissisadmin@reddit
"Most"?
gonewild9676@reddit
And what are the vendors supposed to do?
We have devices out in the field and don't own or control the endpoint workstations. We don't have or want admin rights to them.
Our current plan is to set up our own CA that they'll have to trust and then generate long term certificates. It makes them less secure because if our CA is compromised through an external 0 day they are wide open but I don't see any other alternatives.
streetmagix@reddit
You have devices on your network that you have no control over? Not even via a secured VPN?
If so, you have bigger issues that a short SSL time out.
klauskervin@reddit
It sounds like they provide devices to others that require a cert and have no actual control over access to those devices.
s32@reddit
Doesn't the cab forum ruling only cover server certs though?
Beznia@reddit
Also reminds me of SCADA networks
RememberCitadel@reddit
I feel like you are jumping to conclusions. They didn't say they weren't isolated or restricted in anyway, just that they didn't have admin rights.
That's super common all over the place. People have all sorts of weird devices for various required purposes, and the normal response is to just throw it in its own little dmz with restricted outbound communication, and no specific inbound allowed, sometimes your own staff need to be able to get to it however. That doesn't mean it doesn't need certs though, hence the issue.
gonewild9676@reddit
Devices on client networks.
Think something like a badge reader. It comes with a driver that is a small web API with a cert on it and our web application talks with the driver via https calls to tell it to read the card and send the card number back.
We have to keep a valid cert on that small web API without having admin rights on clients that we don't control.
FarmboyJustice@reddit
If you allow your vendors to have remote control over the devices you buy from them then you've got even bigger problems.
agent_fuzzyboots@reddit
probably manufacturing, i have the same problem 😭
it will cost millions to replace things
mixduptransistor@reddit
Provide an endpoint that the customer can hit to update the certificate. Use DNS as a challenge method so you don't need a public HTTP endpoint. If you're selling a device that is run and managed by your customer, give them the tools to automate it, you don't have to fully automate and handle the renewal yourself
meditonsin@reddit
Which will become even easier once DNS-PERSIST-01 becomes available, since it doesn't require you to put in API credentials for your DNS provider.
mats_o42@reddit
Or use for example EST instead of ACME on your own CA.
EST uses creds for the first request but can use the existing cert as creds to renew
gonewild9676@reddit
Because a lot of the local sites don't have admin rights either. It requires intervention from their IT departments to get admin rights. Many remote assist apps block admin level changes so often this is an in person visit.
It takes us about a month now to get everyone updated with either a standalone exe or a deployable MSI that just installs the exe and calls it as part of the install.
The original plan was to use a Windows service to do the updates but then it would need to run as an admin and someone would have to maintain the password for it and be able to handle things if it doesn't work.
This is over thousands of sites and hundreds of IT departments of various sophistication.
mixduptransistor@reddit
I don't know the details of what you're doing but it sounds like whatever you've got out there in the field is convoluted as it is, so yeah I can see where this new requirement could be a problem
I'd probably step back and rethink the whole process. If you're managing certs for software that is installed on Windows machines that are not managed by an IT staff, I'm curious why you need certs at all. It's a little insane to be deploying little web servers out there that are not under the direct control of an organization's IT team
original_nick_please@reddit
Keep your CA offline and use an Intermediate CA with name constraints, problem solved.
Shot-Bag-9219@reddit
the expiry window will only keep going down. Should use something like Infisical to automate: infisical.com
DonFazool@reddit
Routers, switches, legacy hardware. You can’t put these behind a reverse proxy
rockmanbrs@reddit
I had this issue because the service was whitelisted so that only a specific internet IP could access it but this is where certbot becomes tricky because certbot needs to be able to access the web service to install the certificate automatically.
LetsEncrypt doesn't publish their IP ranges to add to the whitelist so this only really works well for publicly available services. More locked down services are then inconvenienced or less secure since the service needs to be opened or you have to let LetsEncrypt modify your DNS records to create txt records assuming your DNS provider allows API calls.
joshman160@reddit
Try to put an internal cert on it assuming it feasible. Those won’t have the 45 day limit unless your soc forces it. Otherwise there will be a few system that won’t and that will suck
Casty_McBoozer@reddit
Yep this is what we do. We use ADCS for most things internal. If it needs something outward facing I'm trying to automate. I have a few scripts in place for them. Still need to figure out ManageEngine ServiceDesk Plus and Endpoint Central since those products:
1.) Don't support ADCS signed certificates AND
2.) Don't have any automated methods built in.
againstbetterjudgmnt@reddit
I don't know about service desk but opmanager and ad audit plus both use tomcat under the hood, support adcs certs, and you can just replace the file/edit the server.xml with a script.
Then-Chef-623@reddit
We're likely just going to build a Linux ca for these cases. Too many and too varied to try and shove them through adcs.
mcdonamw@reddit
At a former job we used several Manage Engine products, including SDP. It supported ADCS certs. You just need to manually inject the CA root/intermediate certs into the local cert store/files they rely on. The automation is an issue though.
Single-Virus4935@reddit
Internal devices/services are handled by an internal CA with working CRL etc.
External should be handled by ReverseProxies by default, which should work with ACME and able to verify the internal certs.
AlleyCat800XL@reddit
I have scripts for the ME stuff that I can share, if you are hosting them on Windows. The SD+ one does it all, the EC one gets a new cert and emails me with the cert, as my attempts to automate fully failed, and you have to reconfig the secure gateway (if you have one) anyway so I had to interact regardless.
FuzzyDeathWater@reddit
I've written a script that just automates the cycling of the embedded nginx server for ME. If yours does it differently I'd appreciate seeing them.
andwork@reddit
i'm also interested. Could send also to me ?
AlleyCat800XL@reddit
DM me and I will share
Casty_McBoozer@reddit
I'd love to take a look at them. Thanks.
AlleyCat800XL@reddit
I've DMed you
Geekenstein@reddit
Wait until the browsers decide your cert is bad because it’s too long.
ajf8729@reddit
Not gonna happen, there’s no reason to. The 49 day lifetime is a requirement only for public CAs that get included in the browser trust store. Private enterprise CAs you add yourself via management tooling will not be affected.
dustojnikhummer@reddit
Apple/Safari does limit even self signed cert max age
tankerkiller125real@reddit
There's supposed to be a "correct" way to do self-signed certs for Apple to detect them properly... I've seen it done, but don't ask me how because I personally never got it working properly.
FalconDriver85@reddit
We have enrolled Macs and iPhones with our Enterprise CA certificates pushed via Intune. Our internal certificates are valid for 730 days and they work without any issue.
dustojnikhummer@reddit
I don't know why but "there is a way, I tried but fuck me couldn't get it to work" is both relatable and funny
mjung79@reddit
Is that really so? Are you saying that the 45 day limit will be enforced by CA policies that will set the “Not after” to 45 days after the “Not Before”? I had assumed this would be enforced by the browser manufacturers not trusting a certificate that has a >45 day duration. If that was to be the case even though internal certs could be issued for longer durations, browsers would still throw cert errors.
KingDaveRa@reddit
RADIUS for eduroam is a good example of where it's 'fun'.
anonpf@reddit
Why would you do Radius? This 49 day requirement is for external public facing sites, not internal systems.
KingDaveRa@reddit
So this is eduroam, a whole different kettle of fish when it comes to dot1x.
For the uninitiated, eduroam is meant to be open and inclusive - anybody should be able to connect. It's highly federated so anywhere in the world you see eduroam, you can connect. It's all reliant on radius tunneling to do that, and so your certs need to be public and working or stuff breaks.
Also, it's essentially byod wireless for anybody to use with any device. So using self signed certs breaks that. But because it's ubiquitous the ability for people to set up a fake eduroam and steal creds is a risk, so to combat that you should encourage your users (students, staff) to use one of the apps to properly configure profiles to only auth against known good servers with valid certs. So using PKI makes things safer and more trustworthy than a random CA nobody knows. Even if the user just manually plugs in creds.
Of course, some devices use the server thumb print, and that changes with the cert, so that'll be fun.
mangeek@reddit
I like Eduroam, thinking of putting our BYOD users on it. The Eduroam SSID is available at a lot of institutions, and it basically allows authentication to pass-thru to the IdP of orgs you trust. So a user from UniversityA visits UniversityB, and when they connect, the wireless at UniversityB trusts the response from UniversityA and lets them on.
KingDaveRa@reddit
It's pretty much expected at universities in some parts of the world now.
paulanerspezi@reddit
None of that is true really. There is no inherent trust of public CAs for EAP authentication, so every unmanaged Wi-Fi client will prompt the user to verify the server certificate, whether it's from a public CA or an internal one. And since the certificate cannot prove ownership of your SSID (unlike with domain names), in order to be secure users would have to manually specify a domain name to validate the certificate against, or anybody else able to get a certificate from your trusted CA for any domain name would be able to impersonate your server.
So in order to make sure your users connect securely you're going to end up with some sort of Wi-Fi provisioning profile anyway, and then you may just as well use your internal CA.
No point using a public certificate if you can run your own CA.
eduroam documentation: https://wiki.geant.org/spaces/H2eduroam/pages/121346323/EAP+Server+Certificate+considerations
KingDaveRa@reddit
Which is great IF the end users install the profile. Which they don't, generally. I'm not aware of any other institutions running private certs, but I'd like to be wrong.
I'd like to know what the uptake on the geteduroam app is, but I'd hazard a guess it's not that high.
Certainly, up to now JISC have pushed for public certs, so that's what we've done.
anonpf@reddit
I appreciate the breakdown. Learned something new today. 👍
KingDaveRa@reddit
No problem. More info here if you're interested.
https://eduroam.org/
JISC have more technical information here.
https://web.archive.org/web/20251221211538/https://community.jisc.ac.uk/library/janet-services-documentation/eduroamuk-technical-specification
dunepilot11@reddit
(Cries in eduroam)
discosoc@reddit
You don’t have to issue a cert from the device that needs it. Centralized cert renewal with dns01 and an automated deployment process to get the certs where they need to be.
Then-Chef-623@reddit
Then you likely don't need a public cert for it.
Centimane@reddit
They'll be lepers of the IT world. Just like the things that only support HTTP not HTTPS.
They will still exist, but they will be clearly identified as legacy.
chillyhellion@reddit
Microsoft (Entra Application Proxy)
ElBisonBonasus@reddit
How do you automate the certificate renewal for them?
chillyhellion@reddit
You can't, that's the issue.
tankerkiller125real@reddit
You can, but it's an absolute royal PITA.
chillyhellion@reddit
That's fair
ElBisonBonasus@reddit
Joy!
chillyhellion@reddit
Don't even get me started on "Teams Certified Phones" that require device code flow, a feature Microsoft has disabled since 2025 for security reasons.
w0lrah@reddit
How many of these things are actually exposed to the general public and expected to be used by them on random uncontrolled endpoints?
The limited lifetime policies being complained about here apply only to publicly trusted certificates as part of the web PKI. These certificates are intended for use on systems that are exposed to the general public's random devices and where the client system is expected to trust the connection by default. As such, the policies are built to optimize security for those users. They not just don't care about the wants of other markets, they are actively hostile to many of the ways web PKI certificates have been used for internal uses where private CAs would be more appropriate because those users tend to be the reasons public CAs fail to fulfill their responsibilities to revoke certificates when required.
If you aren't providing a public-facing service that needs to be trusted by default by the average joe's device it may still be more convenient to use web PKI certificates, but if you do so you have to understand that your use case is not relevant to the decisions being made by the CABF.
If the system is intended to be public-facing and does not provide some path through which automated cert replacement is possible, it's broken and needs to be either fixed or replaced.
throw0101a@reddit
This policy is for public CAs which are part of the CA/Browser Forum only.
Self-signed certs, and certs from internal CAs (like ADCS), do not have this restriction.
bkrank@reddit
And sooooo, What about things you can’t? You know there a more than plenty of systems that you can’t automate that are public facing that require public CA’s to function. This decision is really a nightmare at this time. Sure, some day every appliance, firewall, SBC, etc will support automation of carts, but there are plenty of existing systems that just don’t support it today.
Whitestrake@reddit
There won't ever come a time when this decision isn't a nightmare.
iceph03nix@reddit
Pretty sure those are the target. They're providing an environmental pressure to push the maintainers to improve their security design or make the product so difficult to use that customers will change to something more modern and secure
DonkeyTron42@reddit
Try explaining that to the bean counters.
NastyEbilPiwate@reddit
That's exactly what you should do - "yes Mr project manager/finance guy, we are wasting $x/yr on renewing certs because our vendors are shit. if we spent $y instead on automation tooling/setting up reverse proxies/buying different products we would be better off"
DonkeyTron42@reddit
Might as well be speaking Greek.
DaveEwart@reddit
Us sysadmins will be too busy manually changing short-lived certificates to have time to explain to the vendors what the problem is.
accidentlife@reddit
Why is your firewall facing the public?
TheDarthSnarf@reddit
VPN would be the most common reason.
hodor137@reddit
Shouldn't be a public cert
NoSellDataPlz@reddit
Yep. Good luck to everyone using Meraki as a VPN appliance. Can’t be automated that I’ve found.
TheRealLazloFalconi@reddit
You've got to be kidding.
accidentlife@reddit
Apologies, I meant to type firewall’s certificate, not firewall.
Brain fart moment.
throw0101a@reddit
No doubt there seem to be, but I'd be curious to know specifics. Because there are (now) ACME clients that are specifically written so you get the certificate on one host, and use various protocols to push things to the device that the cert will actually live on, e.g.:
Post-issue hook scripts could push things the bits via Ansible or SNMP/APIs/SSH(expect).
cvc75@reddit
I think the problem is more with appliances than with servers, and those will rarely have an option to copy certificates via ssh, sftp etc. and will only allow uploading via their shitty web interface.
Nopium-2028@reddit
That's easily scriptable.
throw0101a@reddit
Sure, but I'm curious to know about particular examples/products, as there's a lot more stuff that allows it than there was a few years ago. It used to be that only
telnetworked for remote CLI, but even appliances/embedded systems now have SSH.Miserygut@reddit
It's not binding.
For things like mutual TLS you can still do what you like for certificate lifetimes and accept the risk.
The 49 day standard is to force the public CAs to adhere to best practices. The worst case scenario would be having widespread MITM attacks against all the customers of a specific CA because they decided that they wanted to have long-lived certificates and they all got brute forced. A CA which is lazy enough to want long-lived certificates is also the kind of CA who won't have their revocation process in order either, as we've seen in the past.
BlowOutKit22@reddit
This is not the point at all. The point is the 2nd order effect of certs getting leaked - it's that the CRLs are getting too long for CAs to issue. By reducing the certificate lifetime, any CRLs are also automatically aged out for those certs when they're compromised.
TheDarthSnarf@reddit
You probably shouldn't be exposing those devices directly to the internet anyway... so you front them with something that can handle the SSL offload.
macprince@reddit
So you put those public facing systems behind a reverse proxy that can handle all of the TLS for them. Caddy, for one example, makes it really easy.
TimeRemove@reddit
Could you give an example of two?
ManyInterests@reddit
Are you sure? I was under the impression it would affect internal CAs as well.
Riist138@reddit
If renewal can't be automated, it's time to look at upgrading that system.
mautobu@reddit
Internal root ca with 10 year expiry for the service, then drop a reverse proxy in front of it with let's encrypt.
AutomationBias@reddit
Exactly! You’ll be retired by the time that root cert expires.
narcissisadmin@reddit
You'd think that, but I'm 2 years into the second ten year issuance LOL
DDHoward@reddit
Reverse proxy
da_chicken@reddit
You start pressuring your vendors, just like you did with Flash and Java.
ycnz@reddit
Someone hasn't experienced medical IT, I see.
notHooptieJ@reddit
what does medical IT care?
the dozen air gapped XP, NT, and mac classic machines will still be fine air gapped.
DonkeyTron42@reddit
Yes, there are many situations in medical and other industries that use MSPs and will consider this an unnecessary upsell. Even in fortune 500 technology companies I've seen situations where they still keep around Windows XP systems because they still have critical Flash/Java based systems and don't want to invest the capital to replace them.
da_chicken@reddit
Actually, I have. For 5 years. And I know you have the money to staff it out even if you don't like being a mechanical Turk.
If it's wholly internal, which almost everything should be, you can use your internal CA and sign them with a lifespan however long you want. You just have to deploy your root certificates. But if you don't have an internal CA in 2026 where you're already doing that, then I'm curious how you're managing your Joint Commission accreditation. And if you're not large enough to care about TJC, then you definitely have time to staff it out.
This is only a problem for the devices accessed by third party systems for exactly web traffic. That's almost entirely web servers.
OMGItsCheezWTF@reddit
At an old job we had a bunch of KVMs (like, a datacentre full of them) that used MD5 self-signed certs, baked in at the hardware level.
We just shoved a reverse proxy in front of them and had done with it, the clients saw the latest greatest certificate security, the devices didn't care
Magickmaster@reddit
That's the incentive to make them capable. A device that supports certificates should also support certificate renewal. Be that through certbot or an API.
torbar203@reddit
dedicated VM running autohotkey to click through the GUI to update the cert
thearctican@reddit
It’s all software. Anything can be done.
DropTheBeatAndTheBas@reddit
ooof netscalers and storefront webservers
rainer_d@reddit
Use an internal CA and set lifetime to 5y for certificates.
SirLoremIpsum@reddit
Improve it or replace it
lowlybananas@reddit
With scripts you can automate everything.
wes1007@reddit
Intern/juniours needs to learn about certificates/pki somehow...
8BFF4fpThY@reddit
fix them so you can.
micdawg12@reddit
Open an RFE with the vendor. There are plenty of protocols to automate internal certificates. MSAE for windows, Linux is easy, jamf for mac, write your own middle layer between your internal pki/your systems if you need to. Most appliance type systems have an API/CLI tool you can use to do the cert installations via automation. There are whole CLM platforms that do auto cert renewals and installations via custom scripts/built in methods.
bwick29@reddit
Such as?
Box-o-bees@reddit
Printers.
bwick29@reddit
Oof. Yeah. Sorry.
Pyro919@reddit
Do you have a specific example?
freebytes@reddit
They are basically forcing companies to use CloudFlare or similar proxies.
snifferdog1989@reddit
If it’s internal an internal certificate might suffice. Or put a load balancer/reverse proxy infront of it that handles the cert renew.
calladc@reddit
You got every correct answer in the 2 other replies
/Thread
ThatOnePerson@reddit
Go old school and pay for yearly certs again.
tdhuck@reddit
I like how they are doing this because certs can't properly be revoked and hoping the 'bad guys' won't pay for certs/the process to automate, but we all know they will pay to automate because they make lots of money from these scams.
There was nothing wrong with 1 year, 2 year and 3 year certs imo.
TheDarthSnarf@reddit
It's more the case that the revocation lists are getting HUGE. Which is causing logistics and processing issues to do the cert verifications. Some vendors just aren't even bothering with the revocation checks.
Revocation lists get much smaller, and checks much faster, when there is a much smaller list because you only have to check revocation back to the expiration date of the cert.
From a technical standpoint it makes sense... from a sysadmin standpoint it's a real PITA.
HJForsythe@reddit (OP)
here's an idea. put the revocation in a TXT record in DNS of your domain for the certificate. lol.. omg why are we so stupid.
GoofyCum@reddit
How is a CA supposed to do that for a relying party, as is their obligation under the CA/BF Baseline Requirements within 24 hours upon discovering a key is compromised?
The point of shorter validity periods is that webpki certs have become the default for lots of things that don't need to be publicly trusted and can't be safely rotated in 24 hours, which we've discovered over the past few years and has already resulted in Entrust being pulled from root programs' trust stores. Microsoft itself has failed for 9 months to rotate a bunch of misissued certificates because of technical limitations on CRLs.
If you (the general you) are installing a public cert on something you don't control to the point you can't update for more than a week if it gets revoked, then the only practical solutions are use a private CA of some kind or invest as an industry in automating webpki cert rotation, which is ongoing work.
It sounds like a lot of sysadmins are having trouble making the business cases to their management about this, and that's the whole point of having this decision made by the CA/BF and imposed on them: suddenly it becomes a case of "companies won't issue us long-lived certs anymore, so we need to prioritise one of these two things." Much the same way that 3-year certs died to get people to adopt the basics of a certificate lifecycle management process, so too must the 1-year die so that compromised certs can be retired in a timely fashion.
smartguy_x@reddit
The push toward shorter-lived certs is real and the operational pressure it creates is legitimate. While full automation (ACME, etc.) is the end goal, a lot of teams are stuck in the middle: they need to at least know what's expiring and when across environments. If you're in that gap, some tool like Tokentimer (tokentimer.ch) can help track cert and secret expirations centrally while you build out the automation. Not a replacement, but useful as a visibility layer to avoid surprise revocations.
xpxp2002@reddit
That’s what OCSP is for. The idea that we’re still hosting huge CRLs that have to be appended every time there’s a revocation is absurd.
I agree with OP: CA forum should advocate for a real fix to the core problem rather than passing the buck.
hodor137@reddit
Automation, and not using public certs where you shouldn't be, are the "real fix" for the "core problem". OP said they should change the technology... that's what they're doing LOL. People just can't seem to wrap their heads around it and want to bitch and moan.
OCSP doesn't work in the public trust web PKI environment since people realized all the OCSP responders then had extensive information on all the domain names you've accessed.
TheDarthSnarf@reddit
The vast majority of OCSP implementations don't get rid of the CRL, they simply act as an abstraction layer for the CRL.
This simply shifts a heavier burden to the systems hosting the CRL as they now have to process the OSCP response after querying the CRL.
The CRL is still being appended for every revocation - it's just that the response is only a subset.
Meaning that OCSP is really just kicking the can down the road.
neoKushan@reddit
It has nothing to do with bad actors not wanting to pay for SSL certs and everything to do with improperly secured systems leaking their private certs that bad actors can use to spoof things.
It's trivial to get free certs from Let's encrypt today, even manually. That's not the issue.
ditka@reddit
People might be surprised, then, that acme.sh does not rotate the private key by default (https://github.com/acmesh-official/acme.sh/issues/1308). It just reissues the cert. So the short issuance policy doesn't help with stolen keys in that case.
neoKushan@reddit
That's a forward secrecy issue (As in, bad actors being able to decrypt the encrypted comms), the issue the short lifespan is trying to solve is a separate one around certificate revocation. Different problems.
ditka@reddit
If I have your private and public keys, I can spoof your website. Rotating your public (signed) key frequently doesn't help because I always have access to it (assuming your webserver is publicly accessible, I get it via TLS handshake).
neoKushan@reddit
You can't spoof the site with the private key of the cert because you don't have the private key of the signer (Let's Encrypt).
One key is for encryption, the other is for authentication. Different keys, different purposes.
tdhuck@reddit
If they leak their certs, they should be responsible and change them, not make the rest of the world pay for their mistakes/poor housekeeping.
neoKushan@reddit
You obviously don't understand the problem here. Changing a cert doesn't stop the bad guy using your old cert to do bad things. That's why you must revoke the cert.
tdhuck@reddit
I never said it did. I also never said you shouldn't revoke your cert.
neoKushan@reddit
So what exactly did you mean when you said "they should be responsible and change them, not make the rest of the world pay for their mistakes/poor housekeeping"?
Because the rest of the world does pay for it by having to deal with massive CRL's. The poor housekeeping is not having your certs automated in the first place.
tdhuck@reddit
If they 'leaked' anything then they should fix their mistakes. That's what I meant.
I never said anything about not automating. I'm talking about the duration.
Anyway, it looks like we agree to disagree and there is nothing wrong with that.
klauskervin@reddit
I agree. This change is going to cause more problems than is solves but I guess it will make the automation vendors wealthier.
OverdueBoring@reddit
I've paid $0 to Let's Encrypt for the thousands of certificates they've given me over the past decade. How exactly are they getting wealthier?
thelizardking0725@reddit
My last company started to use Venafi to create a cert request/approval pipeline, handle renewals, and automate cert installation. It worked pretty well — it could handle public CA certs as well as our enterprise private CA, and its ability to automate cert installation was great for the most popular platforms (Apache, IIS, etc.) The major downfall was the fact that you couldn’t automate cert installation for infrastructure devices, which these days get tons of attention and scrutiny from cybersec departments. Some may argue that’s a failure of those device manufacturers, others will say it’s a problem with the cert platform. I’m not throwing my hat into that argument, but I will say the industry needs to sort that shit out asap.
jooooooohn@reddit
Uncomfortable like the back of a Volkswagen?
lordpuddingcup@reddit
Except they forget legacy hardware and appliances that don’t have fucking certbot
If I had certbot on the they’d be on free letsencrypt certs not fuckin digicert or any of the others
yeezy_yeez@reddit
How do you automate it with Digi Certs?
brokenpipe@reddit
Exactly. It’ll be 24 hours in the next 5 years.
djamp42@reddit
in 100 years, every request requires a new cert.
ObviouslyIntoxicated@reddit
Just in time validation
Viharabiliben@reddit
Three new carts from three different vendors. Can’t be too sure.
yet_another_newbie@reddit
so that's what the three shells was referencing!
iansaul@reddit
That's the new zero trust baby.
Darkchamber292@reddit
Lol no it won't. That just stupid.
DandadanAsia@reddit
nah, it will be every 10 minutes
mats_o42@reddit
There is/was a seven day suggestion
Jethro_Tell@reddit
Manjaro Linux is fucked
litescript@reddit
manjaro will find a way to fuck it up no doubt
catwiesel@reddit
honestly. fuck that noise. i HATE others making up all the rules. bad reasons or not. and i WILL die on that hill.
burnte@reddit
Yeah, but it's solving the wrong problem. The way to solve the major issues with SSL is to divorce identity verification from encryption. Instead it just makes things WORSE for humans.
Koxiaet@reddit
I’m sorry, how exactly do you propose to do that without making us vulnerable to MiTMs?
burnte@reddit
Delinking ID from encryption doesn't make you vulnerable to MITM. It simply separates the solution for MITM from the solution for cleartext-communication. Encryption solves 1 problem: snooping on data. No one ever went to a border crossing and was asked to recite an encryption key because encryption doesn't solve identity.
Look at SSH. The link is encrypted even if you have no idea who is on the other end. ID verification can be handled separately. In the case of SSH with a host key and a user login, but that can be anything, and just keep it separate from encryption. An ID validation failure shouldn't expose data.
Koxiaet@reddit
Encryption is meaningless without identity verification because of active MiTMs. They’re not separable concepts.
TLS keys being leaked already don’t cause data to be leaked, because TLS has forward secrecy. But it does compromise encryption because of the MiTM threat.
MedicJambi@reddit
It sounds like just one more way that things can be compromised. What happens when the process is hijacked because you know it will be at some point.
Sudden_Office8710@reddit
Dude quantum computing is coming it will obliterate anything that’s not TLS 1.3 they are not making it uncomfortable so that you automate it they are doing that because it’s the only to protect your environment. You all have the wrong mindset on this it just blows me away
Koxiaet@reddit
TLS 1.3 is also not quantum-resistant unfortunately. Hopefully we will see a transition to PQ cryptography in future TLS versions.
HoustonBOFH@reddit
"They are trying to make it uncomfortable enough that people will automate it."
Or just turn off https. I am seeing that more and more. Not everything needs to be encrypted, and the lazy factor often wins.
scotsman3288@reddit
We have our ingress(nginx) internet certs from Lets Encrypt automated with certbot(RHEL)....pretty pain-free process. 80% of our systems are internal though so everything else is self-signed for 10 years...
HeKis4@reddit
Yeah it's going to be a bit of a pain for airgapped services but there's nothing preventing you from spinning up your internal CA that is trusted internally. The venn diagram of stuff that is airgapped and stuff that needs a "publicly" trusted cert is almost two separate circles.
dustojnikhummer@reddit
Well, doesn't Safari already limit to like 825 days or something even for self signed?
cdoublejj@reddit
why not a new rolling key standard
SorryMaintenance@reddit
Yes with the ACME protocol for your self hosted public services. You can also proxy your traffic to Cloudflare or such and have them handle the certificates to their proxy, then there's multiples choices available for the last hop to your actual server such as trusting self signed certs or using Cloudflare Tunnel.
For Cloud services this is usually 100% managed by the provider.
For internal services you could also you roll out your own PKI for if you can provision a root CA to all devices. Then you set the expiration that suits your needs.
No_Yesterday_3260@reddit
I don't believe its the CA's wanting this though?
It's a security hardening thing.
I do wonder why the CA's don't work together on a tool for this, to easily automate.
I love Fortigate for being able to automate with Let's Encrypt directly inside the fortigate, cert getting replaced and assigned without giving it a thought :D
mysysadminalt@reddit
Yeah… problem is the companies pushing this new lifetime window are also the ones selling automation tools…
STGItsMe@reddit
Yup. People have been doing this basically the same way for 30 years now. There’s no reason to do manual cert rotations.
BoringLime@reddit
Somethings are just hard to automate. The issue that stands out for our company is our rds servers. The actual updating the server is not that bad. It's the updating of the gpo for rds trusted sha1 thumbprints signature hash, comma separated list, in some automated way, that's secure. We aren't the only ones using it, so a internal ca is not an option. I just hate having to create high level service accounts that are basically domain admin powers, for things like this. We have other update automation issues as well, on our erp side. If it doesn't have the hash pushed down, it still works, but you get a do you trust prompt, instead of seamless launch of a rds app.
Erok2112@reddit
Can't wait for automated bad certs due to various reasons. That will be so fun.
bluesky34@reddit
49 days! You had it lucky.
When I was a boy I had to replace certs every 25 days, working 26 hours a day and at the end of the day I had to memorize all the keys oh and eat a handful of hot gravel.
1stUserEver@reddit
The problem is that us Admins have to find a better solution. The majority of the websites have automation to deal with this. We can’t automate vpn certs and Rds gateways easily. It’s going to suck. So do we switch to cloud vpn solutions and ditch gateways and ssl completely? Is that the end goal, to obliterate ssl entirely? Sounds that way to me.
FusilDeific@reddit
win-acme / simple-acme handles RDS (GW and the 4 on the CB) really easily.
1stUserEver@reddit
I’ll check into it. Once automated it won’t be a huge deal at all. Thanks.
AdThick7492@reddit
It's like when shitty websites make me change my password so often that I have to write it down.
lemon_tea@reddit
Updating the SSL cert on that 20 year old managed PDU just got easier....
/s
HJForsythe@reddit (OP)
oh come on you know the mgmt cards in them raritans always die 12 months and one day after you install them
lemon_tea@reddit
You're not wrong. But I've had Schneider/APC devices live so long their still on 100Mb/Half Duplex connections.
HJForsythe@reddit (OP)
Oh yeah Eaton ones too but those damn raritan/servertech CDUs have the worst management ports in history
lemon_tea@reddit
Death upon expiration of vendor's primary service contract. That's why you gotta buy the three year support contract, so the ports don't burn themselves out for three years. :P
HJForsythe@reddit (OP)
yea it is like clockwork. the best part is that the warranty starts when they ship so your spares/backups if they are DOA you get nothing lol
Separate-Fishing-361@reddit
It’s a matter of CAs losing their integrity or being comprised. The CA’s integrity is the reason the cert is trusted. Browsers have to trust sites in scores of countries out of the box, and it’s easier to stop trusting a CA than hitting a revocation list every time.
If you support a lot of servers, you’ll need automation, even just scripting.
sodiumbromium@reddit
I get it. It's fucking annoying.
The problemo is that, hey, there might just be some POS thing that needs a cert that you just can't automate for whatever reason. Don't have easy access, the things fragile as hell, the owners are a PITA.
Healthcare, industrial, etc are rather notorious for this problem.
Real solution is just like anything else in IT: automate what you can with what you have or can get, mitigate the annoyance of the shit you can't and set reminders.
koolmon10@reddit
This. Everyone is complaining about how automation is so easy. Yeah, sure, for a lot of systems. But not every one. It's currently possible to make your certs expire every 59 days and automate their renewal, but not every system can handle that. Best practice will always be ahead of minimum requirement.
goshin2568@reddit
I think you're missing the point a little bit. Nobody is claiming that it's already easy to automate 100% of certificate management. The claim is that it should be easy. What this does is put pressure on vendors to stop making things that don't support certificate automation, and on business consumers to stop buying things that don't support certificate automation.
That it's painful is the point. Unfortunately that's often necessary to drive real change.
spidermonk@reddit
Yeah this is a lot like https. I remember when sysadmins would moan and complain about the needless complexity and load overhead of https and it was really only the progressive ghettoization of http by default settings of various tools and client apps that forced everyone to the sensible position.
Motor-Marzipan6969@reddit
Absolutely true. Some companies will only make changes if they're forced to.
Anecdotally, we have one software that we've asked the vendor for multiple years "when are you going to let us automate the certificate process for this?" and every year it was "we have no plans, please use the dashboard to upload a certificate." After the max lifetime changes were approved, this vendor finally said they're planning to have a process by end of 2026.
omglolbah@reddit
One of the largest vendors of school supplies in Norway refused to adopt electronic invoicing (EHF standard)...
Until several large educational districts went "Starting 1.jan 2025 all vendors MUST support EHF to do business with the district. No exceptions."
Took them two weeks to implement and now every customer of theirs has the option to use EHF.
Same concept.. force is needed sometimes.
NoSellDataPlz@reddit
“SHOULD be easy” is the problem here. It’s taking a hope and a wish and turning it into action. That’s stupid and irresponsible. In the meantime, I guarantee you that what’ll actually happen is everyone is going to let certs expire and just shrug when someone challenges them on it. “Accept the risk or don’t use the VPN”. “ Accept the risk or don’t get on the internet through our content filter”. “Accept the risk or don’t use an app to manage the HVAC system”.
CrotchetyHamster@reddit
We have a couple of decades now of nobody bothering to act when it's just a best practice, though. The reality is, causing pain is sometimes the only way to effect change.
Take it from someone who's worked at a few of the companies involved in these changes - they use this same approach internally, and they know it to be effective. Sometimes, when people refuse to make important changes, all you can do is make them required changes.
NoSellDataPlz@reddit
Even a large organization of a few thousand people is easier to address than literally every Internet accessible organization currently in existence being forced to change. Again, irresponsible and stupid.
CrotchetyHamster@reddit
The point here is that vendors won't change unless they're forced to, and while it will cause pain, the most common outcome if vendors refuse to update at this point is that IT departments will find new vendors who support automation.
And, look... I've worked in gnarlier cert-update environments than just about anyone here. As in, I've worked in major cloud vendors' air-gapped (JWICS) environments, where there's an entirely bespoke PKI infrastructure which none of the deployed software expects, and where you become intimately familiar with how various tools and programming languages provide their own CA cert bundles. I was part of an AWS classified region buildout that necessitated rotating every single secret in the entire region. And I've also been a one-man, small-business IT department, lest you think somehow AWS's internal tooling saved me from pain (though I assure you, it did not). I'm the goddamned Roy Batty of PKI infrastructure - I've seen things you wouldn't believe!
But despite all of this... when vendors refuse to make automatic cert rotation easy, the only recourse is to create a forcing function. And, yes, that's going to suck for a lot of grunts - I've been that grunt, and on many days I still am that grunt - but don't blame the people creating the forcing function, blame the people who refuse to create maintainable systems.
DHT-Osiris@reddit
My favorite part: even in this reddit thread, like half the comments of 'just automate it!' or 'We just automated it!' admit they've got some annoying-ass system that cannot be automated, so they have to build a kludge around that. Can't spell 'more secure' without 'technical debt'.
OddAttention9557@reddit
Got an example? What is it you're struggling to automate? Show us your hand, let us help you ;)
NteworkAdnim@reddit
Yeah I don't understand how you can automate something if there are various technical and logistical roadblocks that make automation harder or impossible. For example, I have SSL certs installed on some systems which are locked down by 3rd party vendors. I can't make any changes to those systems without first getting the vendor involved so they "unlock" the system's config.
OddAttention9557@reddit
Thats's fine - the vendor will have many other clients who are all going to require this, so they'll need to change their software anyway.
NightOfTheLivingHam@reddit
Yep, there's a system that does reporting for a power plant that I am thinking of that is far from being able to be automated. it's an ancient linux based system running apache, the unit costs $92,000 to replace, and it does get vendor updates every few years (and they're the only vendor approved for doing work with CAISO) that needs manual certificate updates. no way to automate, and it's a process through a convoluted web UI. You have to get a crossover cable, connect to the thing in a substation where the floor is vibrating with 500kv running under you.
every 50 days will be fun.
ecnahc515@reddit
Couldn't you issue your own certificate from your own CA for this? If it needs to exposed publicly use a reverse proxy to expose it and have the proxy handle certificate renewals with ACME.
tankerkiller125real@reddit
Her's a solution that I've found works on around 90% of systems so far (including raw TCP protocols), HA Proxy, self-signed long expiration on the legacy shit to HAProxy, auto-rotating short living certs endpoint/public facing.
accidentlife@reddit
The idea is that if you can’t manage your systems to meet this requirement, your system should not be on the internet.
If you want to meet it manually, that’s up to you. But Google expects that if your certificate is compromised you (and everyone else) are well practiced in reissuing a certificate and can issue one quickly.
They especially want to force change at large institutions that place certificate issuance behind multi week approval processes.
sodiumbromium@reddit
Note: I'm specifically referring to internally developed applications. At least in the places I've worked, IT gets caught in the middle between security yelling about best practices and the devs just not caring or not existing anymore.
discosoc@reddit
Do those things need trusted certs? The renewal times are only really about browser cert. Most everything else can just behandled with your internal CA.
gramathy@reddit
Internal certs do not need to meet the requirement, only public DNS based certs.
jake04-20@reddit
Some things you can get away with issuing an internal cert from AD CS and set the validity period to whatever you want. ACME and that should hopefully at least trim down the things that manually need to be updated.
ledow@reddit
Outsource what you can't manage.
Complain and demand change when what you're trying to manage is impractical.
I think we've all been through decades of "But you must use Flash" or "Our banking plugins DEMAND NPAPI support in order to work" or even "It has to run as local admin" to realise that it was all just time-buying horseshit until those companies got on board with reality.
skydiveguy@reddit
This comment is 100% accurate.
I used to work for a bank and they required IE because the entitre core relyed on IE to function. We had to go so far as to block Chrome becasue end users would download it (becasue it lets you install it as a non admin, FU Google) adn they would set it up as the default browser.
Then we uninstalled Flash and the only way to get it instlled again was to reimage the computer with a fresh Windows image... was fine for 6 months until we changed core providers and their ENTIRE training system was builf on Flash. "We need you to reinstall Flash so the end users can do the training". "Nope. Aint gonna happen."
ledow@reddit
Just... 3 years ago? I was fighting with Barclays Bank in the UK for their business service because - whatever package we were using - they demanded Firefox ESR so they could load an NPAPI smartcard software from Gemalto to allow the smartcards to read in the browser for verification.
That place put MILLIONS of £'s through their accounts and it all had to be verified with that shite. We had that in place for TEN YEARS and despite asking for all that time, they said there was no alternative. It started with IE. Then we were made to use Edge (old IE-based version). Then we were made to use Firefox. Then Firefox ESR.
Then even Firefox ESR deprecated that shite and we were told to use an older version of Firefox ESR.
I was so glad to change to a rival company that didn't have that nonsense. I've been here 3 years, they have a different UK bank, and their authorisation smartcards just work in their default browser (Chrome or Chrome-based Edge) and we don't need to do a damn thing for them. My entire team have literally never had to deal with that side of things for the finance department at all in the time I've been here.
BTW I deprecated Flash 13 years ago when I joined that first place and got all kinds of complaints. I just said "No" and that was the end of it. But I couldn't do that for banking and payroll, obviously. Oh, no, your 25-year-old piece of software needs Flash? Yeah, maybe you need to buy something vaguely modern.
skydiveguy@reddit
What I never understaood was that the auditors were ruthless with crap like that on our end but they just ignored the blatent weakness of the core providers.
Ad-1316@reddit
certs expiring, before you get through the renewal process!
ThatBCHGuy@reddit
Automate your external certs, it's not that big of a deal tbh.
HJForsythe@reddit (OP)
Exchange Management Shell would like a word with you.
ThatBCHGuy@reddit
Load balancer would like to have a word with you. Use internal PKI for exchange then. Different rules for internal vs external here.
HJForsythe@reddit (OP)
Oh you mean like an F5 load balancer which also cannot automate external certificates? Niceeeee buddy.
Burgergold@reddit
There is a way, its ugly but if you ask F5, they will provide you the kb
HJForsythe@reddit (OP)
So you're saying it will login to your external SSL provider, tell it to regenerate a new certificate, download the new certificate, and install it even if the SSL provider doesn't have any API of any kind?
Burgergold@reddit
Need a SSL provider who support acme
Zorbithia@reddit
I can't think of any SSL providers that don't support it already, many of them for years now.
Le_Vagabond@reddit
they're already dead to any competent engineer...
schorsch3000@reddit
That's like complaining your you have a hard time getting a modern browser up and running um windows 95 and blaming javascript for it.
If you are using a dinosaur as a vendor, that's on you.
Just automate your shit, having certificates automatically renewed every 49 days is less effort than doing it once every 2 years manual.
HJForsythe@reddit (OP)
Okay but if the whole reason that the certificates have to expire every 47 days is because the technology itself is inadequate then what do we gain by automating the renewal of an inadequate technology? Do you not understand the concept?
schorsch3000@reddit
its not certificates / tls that is inadequate, it's people not being perfect while administering ther systems or random software with security holes that create a problem.
the same certificate would be good for years, but how would "the technology itself" make sure no one gets access to a server on a different way and just takes the private keys with them?
bringing down the lifetime to a time that makes stealing certificates/keys useless is the best thing you can to from within, or do you have a better idea to fix that?
AFlyingGideon@reddit
I've somehow picked up the idea that brief validity periods balance the lack of use of CRLs.
schorsch3000@reddit
which is a flawed workaround for insecure systems, yes.
that workaround didn't stand the test of time, it's wrong on a design level, it can't be fixed, there need to be another workaround
dontquestionmyaction@reddit
What certificate provider doesn't support ACME? Even bloody Godaddy does. What are you using?
throwawayPzaFm@reddit
So you're saying it will login to your external SSL provider, tell it to regenerate a new certificate, download the new certificate, and install it [...]?
Yes
Umm https://www.globalsign.com/en/repository/globalsign-acme-configuration-guide.pdf
patmorgan235@reddit
If you SSL provider doesn't support ACME, switch providers.
da_peda@reddit
Kojot-acme by F5 could work: https://community.f5.com/kb/technicalarticles/automating-certificate-management-on-f5-big-ip/342105
Sudden_Office8710@reddit
F5 is garbage do not use!!! If you want to pay use NGINX, fortunately/unfortunately F5 owns NGINX. Or use open source version of haproxy
Sinister_Crayon@reddit
Yeah, sounds like F5 isn't fit for purpose. Pick a new load balancer or reverse proxy that supports automation of certificate renewal.
I have a Skudonet cluster and haven't had to touch certificates in forever.
throwawayPzaFm@reddit
Yes it can. Been doing it for years. Yes it required some glue.
Shadow591@reddit
If your vendor sucks, get a new vendor or use a FOSS alternative.
bwick29@reddit
Lol what? You new here?
I've had mine automated for years.
scriptmonkey420@reddit
Not too hard with F5, we are doing it with automation.
imnotsurewhattoput@reddit
Powershell can be used for automation
Maxplode@reddit
Tell that to my kemp loadbalancers
imnotsurewhattoput@reddit
My guy , I’m assuming this is your job, you literally get paid to figure this out. Less time bitching on Reddit and more time working would get you out of this problem
Frothyleet@reddit
And it's fun! It's a new challenge! Learning new skills!
I learned a lot about ACME, certbot, and heck linux in general in the aftermath of the last announcement about shortening expiration dates.
And it's not even something in my sphere of responsibility currently. I just wanted to understand the systems better.
HJForsythe@reddit (OP)
Also F5
bwick29@reddit
BigIp isnt a Windows-based system. You wouldn't use Powershell. Just use Ansible or even a bash script. Hell, you dont even need to call the API, just drop the cert on the file system and modify the config to create a new SSL profile for it. You could even modify a VIP to attach the profile, but I prefer to do that manually.
HJForsythe@reddit (OP)
How would it login to globalsign or whatever external SSL provider and download the new certificate? Where does it get the certificate FROM?
bwick29@reddit
Globalsign supports acme. Whip up a vm or container, toss certbot on it, write a playbook or script that calls certbot for a new cert (via Globalsign using acme, or save your comany money and use LetsEncrypt) and ships it to your bigip via api or scp. Write a second one to run via cronjob and check for expiring certs. If expiring soon, issue and replace.
EZPZ.
Frothyleet@reddit
If you use certbot, it literally handles the renewal scheduling for you automatically as soon as you generate a certificate (unless you tell it not to), and manages it with (I think?) systemd timers.
macprince@reddit
Ahem. https://kemptechnologies.com/solutions/lets-encrypt
We implemented this for the load balancer in front of our student information system.
patmorgan235@reddit
Those have native ACME support
ciabattabing16@reddit
Sorry the Federal Government is ahead of you in line with hundreds of thousands of certs.
Sudden_Office8710@reddit
I use haproxy to ssl offload Exchange so I never change the ssl certificates on Exchange and even though I’ve left them expired I’ve configured haproxy to ignore them. I rsync the pem file for haproxy and schedule and issue systemctl restart haproxy and boom I’m done. So I have a central Debian Linux box that will run ACME grab the new certificate and will push it to my various systems. I haven’t needed to use posh-ACME because everything is offloaded to haproxy, NGINX or some sort of proxy. ADFS is a pain in the ass but we will be migrating to M365 and Entra by the end of the year but the 6 month ssl turnover is covered till then. Solarwinds always whines about the ssl certificate but I don’t care about that anymore either because I’m migrating to Nagios 🤣
Chuck_II@reddit
Check out simple-acme. https://simple-acme.com/
DL05@reddit
This. It’s not hard and can also handle Exchange.
Fan2Robot@reddit
Really dumb question and I'm sure I could just ask someone, but we're a small MSP and have certificates on Fortigates an local Exchange server, we do it by hand. Does someone, from the top of their head, know what would some of the best solution to do it automatically would be ?
Frothyleet@reddit
https://docs.fortinet.com/document/fortigate/7.6.6/administration-guide/379103/uploading-certificates-using-an-api
https://letsencrypt.org/docs/client-options/#clients-windows-/-iis
Those are the answers to your base question, as an MSP however this should be orchestrated through a central platform - RMM, Azure tooling, middleware like Rewst or n8n.
If you don't have the skillset internally, you really need to either dedicate a resource to skilling up in this area or pull in some outside consulting.
nullbyte420@reddit
terraform can do it no problem
Fan2Robot@reddit
Looking into it and it looks like it's just what we need. Thanks :)
Simmery@reddit
We have a number of applications, with their own dumb certificate processes, that can't currently be automated.
gex80@reddit
Does the cert exist as a flat file on the disk or an entry in a DB? If yes then it can be automated.
Cyhawk@reddit
Eh screw that. Reverse proxy that stuff. Better security to boot.
mixduptransistor@reddit
https://letmegooglethat.com/?q=reverse+proxy
WDWKamala@reddit
Imagine thinking this is a valid reply.
HJForsythe@reddit (OP)
Yes just add more systems on top of the pile like a jenga tower. Thats high quality engineering.
postbox134@reddit
Put legacy system behind a secure and modern front end is a very reasonable architecture decision
WDWKamala@reddit
It’s a bandaid. A literal bandaid.
patmorgan235@reddit
Correct, the alternative being to replace the old decrepit legacy system.
Sometimes you have to work with what you got, and if you're trying to implement a zero trust posture you'd need to put an identity aware proxy in front of the system anyway.
WDWKamala@reddit
Meanwhile cert validity and revocation could be a simple DNS query. This whole thing is so stupid.
mixduptransistor@reddit
Okay, no one has said that isn't valid, or that the approach the CA/Browser forum chose is perfect, but it's what it is and if you can't automate certificate renewal the answer isn't to bitch about certificate renewal, it's to learn how do do IT in 2026
WDWKamala@reddit
I mean I’m dealing with it like everybody else. You can automate it or hide it behind a proxy while still birching about it.
HJForsythe@reddit (OP)
Wait you mean you can use DNS for checking the validity of things? SMTP would like a word with you young man ;)
This is a great point. WTAF are we doing.
HJForsythe@reddit (OP)
Yep just keep stacking them until it falls over fella.
thefooz@reddit
Honestly, if you think a reverse proxy of some kind for external-facing applications adds complexity and fragility in 2026, it truly might be time to retire. This isn’t a novel concept and is a security and architectural best practice (and has been for some time).
humanredditor45@reddit
Sometimes it’s easy to tell who’s employed and who’s not.
mixduptransistor@reddit
Want me to send you my W-2?
mixduptransistor@reddit
What's wrong with it? If you're too lazy or incompetent to automate the certificate lifecycle in an application or device, or it's a legacy app or device that is extremely difficult or requires some stupid UI automation to automate, a reverse proxy in front of it is completely valid. Doing SSL termination on reverse proxies is something that is done every day in the largest companies on the planet
Sudden_Office8710@reddit
I feel sorry for anyone using kemp. I don’t allow windows to do any certificate management because windows is garbage with security. Run Qualys on your windows machine and you’ll see how bad it is.
Secret-Warthog-@reddit
Thanks, using kemp atm with ssl offloading. This is a real pain...
lsumoose@reddit
No API or anything. Lots of people told us it wasn’t possible for certain apps or appliances turns out that wasn’t true.
SpareObjective738251@reddit
This. I want to replace them so bad. It's a huge hassle.
I have some Cisco fire powers using FDM manager for one client. They are the absolute worst and I've never wanted to space space something so bad.
Rant over, I'm having a rough time lol
ThatBCHGuy@reddit
They are external apps? Cannot be front ended by an ingress or lb?
asmokebreak@reddit
Citrix netscaler has entered the chat
Substantial_Crazy499@reddit
Java keystores would like a word with you
I_NEED_YOUR_MONEY@reddit
Just reverse proxy it and ignore Java’s bullshit
Substantial_Crazy499@reddit
This is not a web server :)
I_NEED_YOUR_MONEY@reddit
If it responds to https requests, yes it is.
Vandilbg@reddit
It's probably a weblogic application server hosting mixed java applications. It will respond on whatever port and protocol the applications are coded to respond on.
Substantial_Crazy499@reddit
The key is used as a wrapper for smartcard related operations on a CMS system. Certs are used for more things than just “https”
MenuPsychological853@reddit
That system is an utter disgrace.
bondguy11@reddit
I'm literally dealing with this right now for one of my servers, shits honestly a nightmare compared to IIS.
There's legit a 3 page guide on how to update the cert for this one server that uses keystore, like I'm sure it would be possible to automate, but my god.
Centimane@reddit
If it's a linux server, and assuming you need to add a trusted CA you can drop the cert into
/etc/ssl/certs/and run the usual updateupdate-ca-certificatesto update the system keystore, which is normally also referenced (but depends on the java app to be fair).Of course I did the hard way of manually adding a cert to a keystore before I found that out. Still hate the java keystore nonsense. Just use the system certs like everyone else.
bondguy11@reddit
It's a windows server and the keystore file is password protected.
The keystore can't be updated without shutting down the application that runs on that server, which runs critical software in a health care setting.
To get the cert to update, we usually download the cert with chain PEM encoded and then break that up into 4 separate files and import each one, then update the CA.
It's not horrible, but automating this and having this server auto restart such a critical application on its own so often in the future is going to challenging.
7854@reddit
Cant you just use the .pfx as a keystore? Atleast in tomcat you can
bondguy11@reddit
Unsure, I can tell you the last 5 years this is how the previous sysadmins where instructed to do it and it worked
Le_Vagabond@reddit
drop caddy or any reverse proxy in front of it and stop struggling. takes all of 2 minutes.
bondguy11@reddit
BACnet traffic will not respond well if we change any type of configuration with this server involving networking.
Le_Vagabond@reddit
drop the reverse proxy directly on the server then? change the ports the java app listens on, then proxy to them.
it should be transparent to anything looking at it from the outside.
Centimane@reddit
Oof. Healthcare and windows. Best of luck to you. May your day contain no HL7.
LordAmras@reddit
And here I was thinking IIS was the worse piece of software ever created, I always forget people have to work with Java.
danekan@reddit
You can export the pem to pkcs12 It’s five or six lines of code to do even if using a vault to securely store the passcode you might use
gex80@reddit
What specific thing about java keystores prevents automation?
Substantial_Crazy499@reddit
Nothing specific to the keystore, it’s the shitty enterprise apps using the keystore and automating ie a graceful restart after the fact, encoding keystore passwords etc
DJDoubleDave@reddit
I finally got a working automation for my java keystores using the community.crypto.acme_certificate ansible module, among others. It's a pain, but it is doable.
Cutoffjeanshortz37@reddit
Look into offboarding SSL to something else. We have a load balancer device that will do this, but something as simple as HAProxy will too. There are options.
yankeesfan01x@reddit
Nightmares.
throwawayPzaFm@reddit
Can be automated like any other deliverable really
fariak@reddit
But then I cant go click click in the UI!
Normal_Choice9322@reddit
It actually sucks. I did it last year and oop! Now the company I used is sunsetting the product and I need to redo all of the work the very next year
whitemice@reddit
The true story of network management tools - depend on them at your own peril.
Ok_Tone6393@reddit
maybe you only understand more simple systems but there’s more to certs than just websites
SandeeBelarus@reddit
It will be a big deal in October.
KavalierMLT@reddit
Clearly you do not work with keystores like java ca store.....
Stonewalled9999@reddit
never uses TomKat or SonicWall I see.
yowanvista@reddit
This isn't a dealbreaker unless you are using legacy applications.
We moved a few dozen web apps behind a reverse proxy which supports DNS-01 validation via API (needs compatible provider) with ZeroSSL or LetsEncrypt. Some trickier services needed an ACME client which can automate PFX on IIS setups, in such cases we just added a public facing AAAA DNS record as the internal network is IPv6 capable.
HJForsythe@reddit (OP)
I wasn't complaining about it being hard to automate I was complaining that automating it doesn't fix the issues with the certificates themselves and as such shortening their expiration doesn't actually accomplish anything.
Busy_Reporter4017@reddit
In a few years, quantum computing will obsolete TLS, so....
HJForsythe@reddit (OP)
someone has been listening to meme stocks
Busy_Reporter4017@reddit
Nope
HJForsythe@reddit (OP)
ok well photonics replaced lasers for networking in 2003 also
nezroy@reddit
This isn't wrong. The modern need to automate SSL renewal on short periods does in fact show that the entire original concept of SSL was flawed.
Unfortunately SSL bundled together two goals, one of which has been almost completely abandoned:
1) identity verification
2) transport encryption
Unfortunately what happened is people overwhelmingly wanted SSL for 2, and the requirements around 1 were overkill for like 98% of use cases.
The identity verification part has been weakened to the point of "did the DNS record of the domain for this cert check out when the cert was issued 3 days ago?" which is, honestly, pretty meaningless.
Your connection mechanism probably already depends on the DNS response for the domain right now, and there are a million better ways to establish DNS authenticity of an SSL connection's credentials with no central issuing authority at all if that is the limit of how much identity verification an SSL cert is going to offer.
We're in this weird middle place where, for historical reasons, a "self-signed" cert was considered insecure, yet now a "automatically signed cert that does nothing more than check DNS" is perfectly acceptable?
We could have just had DNS-backed SSL certs from the very beginning with none of this other renewal and central issuing authority overhead.
cheese-demon@reddit
it's not just historical reasons that a self-signed certificate is untrusted. your connection is encrypted, but to whom?
so browser vendors trust cas (who may trust subordinate cas) and eventually a cert is issued that the vendor trusts. there wasn't widespread dnssec support, and really there still isn't, so they've settled on "controls dns for a hostname, across a wide view" and that last phrase is relatively new since MPIC is now mandatory to be trusted. the end result is that certs are issued to entities that have proven they have at least done a full takeover of a dns zone.
nezroy@reddit
Yeah but I don't need a central authority if ultimately all I'm doing is verifying DNS owernship. I could check a cert pubkey against a DNS record in real-time, or consult distributed registries of my choice that track historical cert pubkeys over the last 60 days, or even just keep a local history myself, to check for suspicious changes.
The current system of trusted CAs and automated renewals is massively overly-complicated for a validation no stronger than "this cert was issued to the owner of the DNS within the last 49 days".
If that's the limit of my identity validation there are far easier ways to achieve that. Trusted CAs and cert issuance is an artifact of a time when identity validation was supposed to be considerably stronger than that.
cheese-demon@reddit
domain validation has never been that strong - an email to admin@ has always been accepted and is still allowed for another two years. remember whois? that was allowed! hell, your registrar could ask for certs on your behalf
the system that exists is the way it is so that browsers can validate a certificate against their own or the user's system's own set of trusted authorities, without requiring additional lookups from the browser. some of that's historical and not as needed since there's a lot more bandwidth than there used to be, but it's still reasonably nice that you can validate whether you're being mitm'd without needing anything more. historically CAs would be harder to MITM though it wasn't impossible, which is why MPIC is mandated now so someone would have to MITM multiple disconnected systems to get a cert issued without controlling DNS. that wasn't just a theoretical threat, KLAYswap users were successfully attacked by a BGP hijack of routes to a CA, then BGP hijacked to use their quite legit cert to direct users to their own servers
if you're not using a browser, or you control your infrastructure, there are definitely other ways you can go. you can trust your own self-signed certs, the browsers just want to chain to a trusted CA. so trust yourself as a CA and issue your own certs, browsers all accept this (with a big asterisk for Apple not trusting TLS certs with a duration longer than 825 days, but at least they're the only one).
your EDIT2 would be considered out of scope for TLS. the HSTS preload list is a browser-side mitigation for a downgrade attack that simply can't be resolved with TLS alone
i do look forward to your future RFC plans.
iamabdullah@reddit
How on earth is a DNS validated cert meaningless?
C0rn3j@reddit
Our TLS certs already expire every 90 days, bringing it down to 47 won't be much different.
Why do you hate automation?
DharmaPolice@reddit
No-one hates automation, but it's not easy to automate some systems.
gex80@reddit
Is there a specific example of a system that actively cannot be auto-rotated? The specific application not category of software.
If it's custom and you have access to the source code, you can change it yourself.
asmokebreak@reddit
Citrix netscaler, for one.
gex80@reddit
https://docs.netscaler.com/en-us/netscaler-console-service/networks/ssl-certificate-dashboard/automated-certificate-management-environment.html
What is this?
asmokebreak@reddit
You must be a god, my entire staff can NOT find a kb article on this and Citrix support was useless.
I bow to you. Now I gotta migrate off network solutions, but it was time anyways.
gex80@reddit
I just googled it. "citrix netscaler letsencrypt automation". Literally the first link on the search results.
https://i.imgur.com/xuOrae1.png
OddAttention9557@reddit
Claude and ChatGPT can both answer this question and provide guidance in a matter of seconds; if you're not already using these tools you really should be!
OddAttention9557@reddit
In fact, fire your entire staff; it's literally the first result in Google. God alone knows what else they're failing to find...
Joshposh70@reddit
Azure Key Vault certificates can only be automated if you pay Digicert, they don’t support any other CA.
You can script it if you want to spin up additional infrastructure and fancy maintaining a K8 or similar for the rest of eternity. But it’s not just a case of installing Certbot and walking away.
Mike22april@reddit
Theres various CLM products allowing you to use any supported public CA with Azure Key Vault
Mike22april@reddit
Theres various CLM products allowing you to use any supported public CA with Azure Key Vault
gex80@reddit
Based on how I read the docs it sounds a lot simpler than what you're making it out to be. They even provide the commands to do it. Powershell on it's own can work with acme certbot. That handles the renewal details and then the next part of the script uploads the renewed cert to the key vault. And since they are versioned it doesn't sound like the items pointed to the cert care since there is an abstraction.
https://learn.microsoft.com/en-us/azure/key-vault/certificates/overview-renew-certificate?tabs=azure-powershell#renew-a-nonintegrated-ca-certificate
Cyhawk@reddit
Ooo read some of the comments in here. Quite a few people are against automation and are making some of the lamest excuses why they can't do X/Y/Z.
OddAttention9557@reddit
Long-term it's usually easier than not automating them. *shrugs*
50DuckSizedHorses@reddit
What are you using the certs for? Public web server PKI is already automated, and is not fairly comparable one to one with private infrastructure certs generated from a private CA where you can set any renewal time you want. If you’re talking about networking, wlan controllers, and private infrastructure servers, the vendors are way behind this idea of 49 days. They need to figure out a more complete and flexible way to give us all options other than manually replacing certs all the time, other than figuring it out on our own with APIs or bespoke automation.
whitemice@reddit
Yes.
So much of working in IT is now participating in Security Theater.
50DuckSizedHorses@reddit
Security Theater. I’m gonna use that.
Iriguchi@reddit
I find it so funny that a lot of answers here are about automation, but never answer the actual part of your question.
So first and foremost: yes, automate it all, "problem solved" is kind of the short term correct answer.
However, I do feel you have a point, and I share your sentiment about the second part. Namely, the reason for said timeframe and the entire validity of certificates.
So they want to shorten the lifespan because they say "we cannot be sure that the private key is safe for such a long period of time like it was before". I wouldn't even object to that statement, except for the ridiculousness off what it is becoming. We went from 5 years to 2, to 1 year. Now some standards are already at 6 or 3 months.
So the actual question is still standing: are certificates not obsolete? The answer today is: no, but only because there isn't something better that is widely supported. I think if there was an alternative, we would all jump ship and never look back at the cluster fuck that certificates are.
So yeah, for now, I hope you can automate it all, but I share your sentiment about certificates and look forward to something better, whatever and whenever that may be...
Centimane@reddit
Certificates aren't that complicated. A lot of people lack the fundamentals of what they are and how to use them, but are forced to manage them anyway, I think that's where a lot of the frustration comes from.
Certs are basically just a one-way hash of a private text file. The holder of the private file is the only one who can perform that hash, and you trust they are who they say they are as a result. (this is a simplified explanation)
Certificate authorities are just someone you trust to check someone out before the certificate is handed out.
The trouble is you can't revoke certificates effectively, and there have been attacks in the past that compromised private keys, so then that attacker could effectively impersonate someone else. Maybe a way to do that would be to force you to contact the CA when you consume a cert to check if it's still valid, but that would slow down all HTTPS traffic noticeably. Storing the "trust" locally is better for performance.
Iriguchi@reddit
The main issue for me is that they are not newbie friendly. I have, for the tasks I'm responsible for never been able to request a cert, download it and just click install or import. Every freaking system either needs them in a different format, needs a different order for the chain, needs you to implement weird names and so on.
So every new appliance/application you always need to trial and error because the vendor documentation is awful when it's not just a simple webserver.
And don't even talk about java keystores.
So yes, once you've dealt with them, you know what to expect. But imagine it's your first time dealing with certificates on your own. I genuinely wish you all the best.
uptimefordays@reddit
But someone who understands what certificates are and how they work shouldn't have trouble using a standard tool like
opensslto perform most basic certificate management operations.GoofyCum@reddit
While I agree with this in spirit, I do need to complain that some of
openssl's CLI arguments are downright esoteric / inconsistent between operations in a way that adds a lot of friction. I'm following the development of a few alternatives folks have written, and they seem to be learning from those mistakes.uptimefordays@reddit
The use of basic tools like
opensslshould be a prerequisite for managing enterprise certificates.Centimane@reddit
The first time I needed to use OpenSSL on a cert was pretty enlightening. It really demystified them in a way. "Oh this is just a text file I can use this tool to parse/edit, cool".
uptimefordays@reddit
Right?
Centimane@reddit
I think part of the reason for these changes is it will pressure everything so hard to conform to the norms.
Things that don't conform are annoying but manageable with the once per year frequency. But with 47 days you will conform or you will be dead to the internet.
TheFluffiestRedditor@reddit
I implemented my first CA/PKI system in 2004. It was a complex nightmare back then, and honestly it's only got a little better since then. Certificates themselves are not complicated but the PKI system is, and it's very easy to get things wrong if you don't understand it. I've met very few people who truly understand PKI. Very not enough people.
zero_cool09@reddit
Do you think the industry may eventually move to certs expiring within a week or day even? Since our industry seems to continually become faster paced, especially with AI/bots being able to accelerate this. It leads me to thinking, what stops certifications from going this way.
Centimane@reddit
I wouldn't be surprised. The shorter the lifespan, the less impactful shortening it is.
The 47 days is already "too short not to automate". On that premise everyone will be heavily pressured to automate cert renewal. The issue I could see with shortening it further would be the load on the CAs - they're already going to see a big uptick in traffic when people have to renew certs nearly 10 times more frequently. Going from 47 to 1 would be almost 50 times more traffic for the CAs, and they'd probably struggle to keep up.
eaglebtc@reddit
Mark my words: in a few years, we will start to see attacks on certificate authority services to try and knock critical applications off-line during a window where they ought to be renewing their certs, but can't do so because the external CA was DDOS'ed.
Centimane@reddit
There are a fair number of CA's, and they're already a huge target. I would generally expect them to have their shit together.
But for sure, the more important they are the more they'll be targeted. I would bet we see even more CAs pop up. Maybe even something at the local level like ISPs usually acting as CAs to help control the problem.
uptimefordays@reddit
100% accurate!
thortgot@reddit
The unilateral trust method is an issue.
Surely we would be better off with long lived certs that incorporate a form of cert pinning.
Cert revocation should be possible we should just give up 49 days of attack surface.
Camera_dude@reddit
Not to mention that we can't assume 49 days is the lowest they will go. How much lower can the bar drop?
I would retire if certs had to be replaced every 10 days even if it could be automated. Automation breaks, then suddenly your whole org is calling your desk about no internet access or the main org website being down.
Human-Secretary-8853@reddit
I’m in no way an expert on this but when quantum AI matures enough to achieve something equal- or akin to Shor’s Algorithm then new certs will be delegitimized instantly. Hopefully the “good” side matures before we get to that point because then we’ll have way bigger problems lol.
eaglebtc@reddit
I think we may start to see attacks on certificate authority services to try and knock critical applications off-line during a window where they ought to be renewing their certs, but can't do so because the external CA was DDOS'ed.
CA's are inadvertently turning themselves into the linchpin of Internet infrastructure; that makes them a target.
cdoublejj@reddit
i think, yes obsolete, we need something that meets our needs better.
Rzah@reddit
If this is all because the private keys might have been exposed, I don't understand how replacing them achieves anything, if the bad guys already have a way to access to your private key, then they'll just grab the new one as soon it changes.
Unless the real reason is that 49 days is just a lower bound for brute forcing/quantum divining the private key in which case the fix should be way stronger encryption not shorter lifespans.
This all feels like the mandatory password changes every x days stupidity.
adsarelies@reddit
I think it's ridiculous to think that if your private key got compromised, (if someone is hacking your shit), giving them 1 month vs 2 months to write a ransom note makes no difference.
frymaster@reddit
imo it's not so much about trusting that the private key is safe so much as confidence that the entity that was authoritative for a domain in the past should still be trusted now
skipITjob@reddit
Does anyone know how to automate Microsoft Application proxy TLS certificates?
Frothyleet@reddit
https://letsencrypt.org/docs/client-options/#clients-windows-/-iis
skipITjob@reddit
I'll have a look tomorrow, but for the Microsoft application proxy you have to upload the certificate online.
Frothyleet@reddit
Oh ha, I thought you were talking about remote apps.
If you are talking about Entra app proxy you will need to use the Graph API.
You could also choose to issue a certificate from your own PKI with as long of a lifespan as you want, apply it to the app proxy, and use GPO/Intune to push the cert out to your endpoints as trusted.
skipITjob@reddit
Thanks. I'll have to check how to get the certificates applied via graph API.
I don't think we can do self signed, if I remember right the Cyber Essentials plus audit checks of we have self signed certificates installed on mobile phones and fails us if we do.
Frothyleet@reddit
There's nothing insecure about doing your own certificate signing if you're actually managing it, but your auditors may not understand that I guess.
skipITjob@reddit
Yeah the Cyber Essentials Plus audit can be strange at times...
Assumeweknow@reddit
Time to no longer use certs... honestly, this is purely proving they are useless.
wired43@reddit
I told all my coworkers, and got an eyeroll. Knowing I'm going to be the person that will have to deal with it. I'm guessing we go w/ automated tools.
https://www.digitalocean.com/community/tutorials/automate-ssl-certificates-https-renewals
HJForsythe@reddit (OP)
Automating it is fine but that doesn't fix the underlying issue.
deac714@reddit
We are working on using Ansible* to automate SSL cert management for this very reason.
HJForsythe@reddit (OP)
Yeah, for me the point isn't really how long does it take to copy one file and then restart whatever daemon. It's more about how it's a huge problem and that huge problem isn't being solved by expiring the certificates faster.
BarracudaDefiant4702@reddit
I don't see many that answered your question about certbot with other cert providers.
Yes , certbot can work with other cert providers. We use it with https://zerossl.com/ in addition to letsencrypt. It's not free, and we have more certs under letsencrypt because it tended to be more reliable last time we had an incident but we have our automation setup that we can easily switch the source per domain and the price doesn't have a limit of 90 day certs and can also do 1 year certs but we don't make use of that. Letsencypt has generally been reliable, but we have over 350 certs and don't want to be dependent on something that critical without a backup plan and there has been a few cases of letsencypt being down or rate limiting...
Zero_SSL@reddit
Would you like to share with us, why you are using Certbot configured with ZeroSSL, and not acme.sh or other 3rd party clients?
BarracudaDefiant4702@reddit
Did the setup over 5 years ago and it still works, and certbot was setup years before that for letsencrypt. Was easiest to modify our call to certbot with --eab-kid ... --eab-hmac-key and --server and keep everything else 100% the same then to look at something else.
dakruhm@reddit
If internal PKI, the limits do not apply.
If external, cloudflare. Takes 5 minutes. See you in 15 years.
remember_this_guy@reddit
Expect alot of jobs poping up on indeed with titles like senior Cert Admin or SSL admin, what a day
Ok-Measurement-1575@reddit
I suspect it will get a lot shorter than 49 days at some point.
HJForsythe@reddit (OP)
sweet
buthidae@reddit
Yes 100%
TCB13sQuotes@reddit
This is plain wrong. Millions of certificates are renewed by let’s encrypt, zero ssl and some other providers with that technology and with works perfectly fine.
Just because your software / infrastructure is designed in the wrong way that makes certificate management impossible to automate doesn’t mean that standard are wrong.
HJForsythe@reddit (OP)
why do the certificates need to expire so often in the first place? its a limit of how they were implemented.
viswarkarman@reddit
Quantum.
HJForsythe@reddit (OP)
yeah and if my momma had wheels she'd be a wagon.
TCB13sQuotes@reddit
Due to multiple reasons, the first one is that people keep managing certificate renewals very poorly and a short timeframe essentially forces everyone to automate it probably once and for all. You know if they’ve made it 6 months people would still do it manually, 47 days or less makes it so annoying that you’re essentially forced to automate it.
The other two reasons are:
1) certificate revocation has been proven to be unreliable and by reducing the time if there’s some issue with a revoked certificate it will get invalidated either way in a reasonable timeframe.
2) shorter certificates are safer because if some security cypher is found to be insecure you’ll be using a new one faster once the certificates are renewed. Same applies to stolen keys etc.
lizardhistorian@reddit
If we want to get real the lifetime of a SSL cert today is 12 minutes.
Can't put the genie back in the bottle. Encryption is about to end.
SnooCats1153@reddit
dude i wrote a bash script like 10 years ago to auto check and renew ssls for my domains like everyday, and i havent looked at it since. i have no idea if ssl renewals are 1000 days or 1 day i have never noticed or cared. ?
HJForsythe@reddit (OP)
post it.
Le_Vagabond@reddit
https://acme.sh
HJForsythe@reddit (OP)
No I wanted to see his script from 10 years ago.
Le_Vagabond@reddit
same thing using https://github.com/certbot/certbot instead, clunkier and requires python which is why acme.sh is much better.
Zero_SSL@reddit
Can we quote you on that? 😃
Le_Vagabond@reddit
sure thing, I knew you sponsored acme.sh but I didn't know you took it over.
it's great, it just works. with delegated DNS subdomain and/or records in IDP you can do pretty much anything you want in as secure a fashion as you like and it's easy.
Zero_SSL@reddit
Yes, for quite a while. We have been sponsoring and supporting acme.sh for a long time, we just were not very vocal about it.
With the upcoming shorter certificate lifetimes, the value of solid ACME automation becomes much more obvious for users.
Le_Vagabond@reddit
it was obvious 10 years ago ¯\_(ツ)_/¯
retro_grave@reddit
FWIW, ACME spec was defined ~12 years ago [1] and I think the client is at least 10 years old.
[1] https://github.com/letsencrypt/acme-spec/tree/v00
SnooCats1153@reddit
its actually so funny u think this is some impossible feat of engineering that surely cant be done lmao
SnooCats1153@reddit
ok sure gimme a minute i just gotta check with my managers if its ok to publish private internal corporate scripts publicly on github for some reddit user who claims to be a sysadmin but cant write a simple 10 line bash script
sloppy_custard@reddit
If you wrote is 10 years ago it’s likely generating certs that a properly hardened box in 2026 should tell to fuck off
HJForsythe@reddit (OP)
Yeah I'm sure thats the issue.
DeathToMediocrity@reddit
Following this comment.
Conscious_Cut_6144@reddit
Totally with you.
And even worse, when a hacker gets on your system, instead of getting 1 cert that’s good for 1 year, they get the login from your cert renewal script that allows them to make as many certs as they want until you notice and change it.
HJForsythe@reddit (OP)
I didnt even think of that.
ItsNotGoingToBeEasy@reddit
SSL was about to go unfunded in…2012? That company I worked for did a diving catch with Red Hat I think. The thought of all SSL going dark because everyone assumed someone else was paying the guy in his basement was kind of fascinating. /hij
HJForsythe@reddit (OP)
Huh?
adude00@reddit
I get the point. Is compromised certificate even an issue?
Scammers use let'sencrypt on domain names that looks plausible and get their little lock icon that we've been telling users to look for for decades.
Personally, I've automated every renewal, but I totally feel your pain
Keensworth@reddit
If you don't like certbot, there are a lot of other stuff, such acme.sh, getssl, caddy, traefik, Gert-Manager and I just checked from let's encrypt.
You don't like Let's encrypt, you can also validate with ZeroSSL.com CA, SSL.com CA, Actalis.com CA...
Honestly, automating TLS certificates made my life easier.
zorinlynx@reddit
Yeah, honestly certbot sucks. It's bloated and unreliable in my experience, usually trying to update itself and failing when renewing a cert.
acme.sh is the way to go.
Zero_SSL@reddit
Any features you like the most on acme.sh ?
Frothyleet@reddit
My problem with certbot is that the maintainers desperately want it to be a "it just works" kind of tool - you go to the website and it's like "here, select these dropdowns for what you need to use it for!". And in implementation, for specific use cases, it will "just work" if they've built the scripting for it into Certbot.
Benefit of the doubt, that's helpful for novices whose use cases luckily fall into the Certbot pre-designed scenario.
But for me, a more ~~advanced~~ intermediate user, it made things more confusing. It was a pain in the ass to even find the documentation (on the main certbot website, it's buried at the bottom - or otherwise you have to click through its little wizard saying "I'm doing something different").
Didn't help that I'm not super *nix savvy, but once I finally got there I found the syntax info I needed for the challenge (syntax for using DNS and the Cloudflare API) and the logic for actual certificate installation (understanding deploy hooks).
Zero_SSL@reddit
Thanks for the mention.
You are absolutely right that automation is the key. We are currently in a transition phase. While many CAs, including us, still offer commercial plans that cover up to a year, certificates themselves are capped at a maximum lifetime of 200 days since March. That means at least one renewal is required to span the full period.
Starting next year, this becomes much more relevant. With 90‑day certificates expected to be enforced globally, manual processes simply stop being practical. At that point, the operational cost and risk of manual renewals is far higher than investing in proper automation.
In practice, you are looking at roughly 5–7 renewals per year, depending on how much safety buffer you want to maintain.
For anyone interested in the background, here is a detailed explanation of the 200‑day certificate lifetime and what is changing: https://help.zerossl.com/hc/en-us/articles/34330849350173-SSL-TLS-Certificate-Validity-Changes-New-200-Day-Limit-Explained
BOT_Solutions@reddit
Honestly, I think people are talking past each other on this. I can automate certificate renewal, that is not the issue. The issue is whether forcing ever shorter expiry windows is actually good engineering or just pushing more operational churn onto everyone else. If your security model depends on turning a routine task into a permanent treadmill, that does deserve criticism.
As for Certbot, I would not think of it as only a LetsEncrypt thing, but it is definitely most associated with that world. The real question is whether the CA supports ACME and how cleanly they support it. If they do, then automation is realistic. If they do not, then vendors telling people to just use Certbot feels a bit like waving at the problem from across the room.
Avas_Accumulator@reddit
"Luckily" most our certificates are handled externally by the big proxy companies, meaning we don't have to do much. However, there's always that one app..
Tymanthius@reddit
I suck at certs, but automating my own at home via Let's Encrypt so I never have to worry about it again wasn't terrible.
I wouldn't offer to do it at a business level b/c that's not my skillset. But for someone who it is their skillset, I can't imagine it will be THAT hard.
the_marque@reddit
It's easy at the basic "point certbot to my apache server" kind of level, and I'd argue any competent web team should be able to manage it themselves.
The problem is all the other random services you have out there that use TLS, that may be really clunky to deal with, and putting in band-aid automations may not be appropriate for a range of reasons.
the_marque@reddit
When it comes to automating certificates, ACME is ACME. Doesn't matter if the CA is Lets Encrypt or anyone else. What's a supported or out of the box configuration for a given tool is another matter, though.
I am also very cynical about this change. There's certainly such a thing as a compromised certificate, and certainly such a thing as an unavailable CRL, but these factors are being blown up beyond any reasonable assessment to justify a change that's actually about keeping the money train rolling.
Regardless, it is happening. The 3 month period is already basically unworkable for manual certificate management and there's nothing anyone can do about it except automate. Yay.
cyh555@reddit
Sorry I am late to the party, what am I missing here?
KKMP5@reddit
Påb F
Same-Many6879@reddit
For one thing, you don’t have to follow that rule. When it comes to your own certificates, you’re still free to choose longer validity periods.
There’s a reason for shorter validity periods: certificates are difficult or impossible to revoke once they’ve been compromised.
Wherever possible, certificate renewal should be automated. If a particular piece of software doesn’t support this, put pressure on the vendor.
mixmatch314@reddit
Certificates are easy to revoke, but nobody bothers to check revocation lists. At least Firefox tries...
uptimefordays@reddit
The original problem was that certificate revocation was broken in practice. CRLs were slow, bloated, and browsers mostly soft-failed on them (if OCSP/CRL checks failed, the browser just... proceeded). OCSP stapling helped but adoption was inconsistent. The result was that a compromised certificate could stay "trusted" in the wild for years because revocation didn't reliably work.
The "revocation is too hard" resistance was substantially self-inflicted—CAs and large operators had financial and operational incentives to keep cert lifetimes long (fewer renewals = less support burden, and for paid certs, a longer sales cycle argument). The technical barriers were real but not insurmountable; they just required investment that nobody wanted to make.
The CA/Browser Forum's response to this was essentially: if revocation can't be relied upon, then the next best control is shortening the window during which a compromised cert remains valid at all. That's not a workaround—that's a sound security principle (reduce blast radius by limiting time-to-expiry). The progression from 5 years → 3 years → 2 years → 1 year → 398 days → now 47 days is a deliberate, incremental tightening driven by that logic.
perfecthashbrowns@reddit
There was also that big drama with Entrust, right? Where they issued certificates incorrectly, or there was a compromise? And Entrust didn't want to revoke because it would take weeks for some of their customers to replace the certs, so they were citing exceptional circumstances. This pissed off the Chrome people who removed Entrust from the trusted certs. And it further pushed people to support this already-tightening expiration window. Since if CA customers are already automating cert renewals it makes this exceptional circumstances excuse less valid.
uptimefordays@reddit
The validity period debate and the Entrust distrust are distinct events with distinct causes, but Entrust illustrated in real time exactly why the CA/B Forum’s patience with “revocation is hard” arguments had run out. It’s less that one caused the other and more that they’re both symptoms of the same underlying dysfunction—CAs and their customers treating revocation agility as optional.
The Entrust situation (2024) was specifically about misissuance: Entrust had a pattern of failing to revoke misissued certificates within the required 5-day window, citing customer hardship. Chrome’s response was to distrust Entrust as a root CA entirely, which is a much more severe sanction than anything related to validity periods.
gehzumteufel@reddit
FWIW the 398 to 47 has some steps in there too. It's 200 days as of March 15th for certs issued March 15th and later. Next year on the same date it goes to 100. And in 2029 it goes to 47.
FloridaIsTooDamnHot@reddit
This response needs some major love. This is the most salient point I’ve read about the certificate life changes.
uptimefordays@reddit
Thanks!
elatllat@reddit
Automate it anyway with something like SikuliX
Stonewalled9999@reddit
Have clients with 10 year self signed for RDS GW. And I kinda like it as a domain joined PC gets the cert via GPO and a non agency PC, gets SSL warnings and gets booted out.
koolmon10@reddit
Yes but none of this requires the cert to have a 10 year expiry. You could just as easily make it 30 or 90 days and it would be the same. Domain joined would still get the cert via GPO every time it is rotated, and non-domain still get booted.
Stonewalled9999@reddit
we do 10 years because no, its not automated and my client doesn't like hiring me to to do stuff properly so I do it their way
koolmon10@reddit
Just the way God intended
Stonewalled9999@reddit
I mean it works ok last month they sent me an email and said you don’t charge enough. You need to be charging us 40% more. So I’ll be happy to work screwing stuff up the way they want them for that kind of money.
baconmanaz@reddit
Would shorter certs add enough extra security to be worth it? 30-90 days means we're already manually installing and reconnecting people coming back from FMLA since their computer hasn't been on while they were out. Shorter and you start adding in people on vacation.
koolmon10@reddit
Probably not, but if it's automated it can certainly be shorter.
FloridaIsTooDamnHot@reddit
You left out a key point - this is only true for internal CAs. Browser safe certificates still must go through external CAs and this policy holds there.
neoKushan@reddit
However this has been a solved automation problem for a very long time. I'm sympathetic to those who have hardware or software that isn't easy to automate, but for the browser (Which let's face it is why this change is being made) it's trivial to automate. Literally every single web server and reverse proxy still in use today has a solution for it. If it doesn't, you have no excuse for using it.
Same-Many6879@reddit
I'd say that in this case, it's not really your certificate if you need an external CA. But yes, in principle, you're right, of course.
cdoublejj@reddit
we need a new standard that meets the needs better. might as well jump to rolling keys or something smarter from someone smarter than me.
dzfast@reddit
I think this is actually unlikely to be viable. The browser organizations (Apple, Google, etc.) are actually the ones who were lobbying for this.
OPs post makes this seem like it was a decision by some random asshole. It wasn't, it was voted on by the consortium that sets the standards for SSL internationally.
Automation is going to be the only way to manage this. This also will suck if you work at a company unwilling to pay for support and updates to the products it uses. I also don't care about that, because operating like that is making everyone's life harder. Start doing things the right way ffs.
LoornenTings@reddit
How often should we reset our passwords
WDWKamala@reddit
Yes. Because we’ve seen such rampant abuse of compromised certificates. Happens all the time. Look at Iran right now. Would that be happening if we properly expired certificates?
HJForsythe@reddit (OP)
You're saying the Iran war is because certificates used to expire every 365 days instead of 49 days?
WDWKamala@reddit
No I’m sarcastically declaring that there has been almost zero impact from certs that don’t expire quickly.
dhardyuk@reddit
There is a lot of disruption for orgs that don’t tightly manage their internet facing certs reacting when they expire by surprise.
Also many orgs get a single wildcard cert that then gets used everywhere. When these get exposed or the keys get lost this makes a stupid problem a major issue because of how wildly spread the cert is. I used to get different wildcards for different purposes so that I had options if keys were lost or compromised.
Forcing the idiot orgs to automate is the goal.
Opposite_Bag_7434@reddit
Yea this really is stupid
Witty-Culture-5978@reddit
Yea pain in the ass
chris-itg@reddit
If the technology itself is inadequate then change the technology itself.
I think if you meant to swap out process for technology. It’s 2026, certificate automation is something your team should have implemented years ago, the technology isn’t broken the manual process is.
If companies hade made the switchover as ACME clients became available they would have been positioned to tell vendors that don’t have these processes in place to take a hike. Instead waiting and failure to respond appropriately to change have put orgs in this position.
VNJCinPA@reddit
Stop. 98% of all businesses are small businesses. They aren't ready, and they won't be ready. You're simply wrong.
chris-itg@reddit
This is hilariously a wrong take. Small businesses are the EASIEST to automate certs. Free certs from letsencrypt/cloudflare make this darn near trivial. This is r/sysadmin not r/ShittySysadmin if you were not being sarcastic in this response please return your sysadmin title and move along.
neighborofbrak@reddit
ACME
Takeoded@reddit
That shit should be automated anyway, if you're manually installing SSL certificates, you're doing it wrong.
chandleya@reddit
Honestly if you’re threatened by it … it’s a sign. It wasn’t a random group and the decision wasn’t flippant.
VNJCinPA@reddit
No, but it only applies to about 3% of all websites that should care. It ought not be forced upon the other 97%.
chandleya@reddit
You said no for some reason
VNJCinPA@reddit
No, it wasn't flippant but it was definitely overreach
Rin-rs@reddit
We've been automating certs since 2018 for all customers, this change means nothing.
thrashinpickle@reddit
First thing I thought. We've automated this for some time as well, and there's let's encrypt...
LeeFrann@reddit
"Clearly the solution lies with Indian MSPs."
-Business team who doesn't want to update software on Windows server 2003
schrombomb_@reddit
We're moving to zero trust. That's just the way it's going. This is really only for public sites, browsers are gonna know if a certificate is signed by a private ca and will not apply these restrictions to those certificates. It doesn't make me want to retire because I've already had any public facing sites automated for 10 years now.
PaleoSpeedwagon@reddit
Don't suppose you have a reference you're using? stares mournfully at field of public sites
flerchin@reddit
Do you want curl -k everywhere? That's how you get curl -k everywhere. Stop breaking ssl people!
PaleoSpeedwagon@reddit
Also, ants.
No_Resolution_9252@reddit
The tech has been out there to automate it a long time. The fast rotation solves the issue of checking revocation lists that keep getting larger and larger and the complexity of things like implementing OCSP. In practice, too many apps just never check revocation status and revoked certs could be used for years.
It also solves the near universal problem of mismanaging wildcard certificates' confidentiality
VNJCinPA@reddit
Except IKEv2, amongst others
longmountain@reddit
We should also change domain names to something random every 49 days. Can’t be too careful.
Vexser@reddit
For some non-critical or trivial sites (without logins, payments etc), HTTP might be an alternative. Obviously for banking and commerce HTTPS is mandatory. But I can see this thing going towards a dystopian "central authority" which decides (real time) which sites you are allowed to access, based on the site's "social credit score." I get the feeling of the "thin end of the wedge" going on as more friction is being added to administering web sites.
npiasecki@reddit
If not retiring now then by 2036. Or was it 2038? AI will tell me when it all blows up right
deskpil0t@reddit
You can setup your own certificate authority and lengths for non-customer facing systems
flummox1234@reddit
ACME and Caddy.
jkeegan123@reddit
Everyone moves to let's encrypt self signed, no more vetting... Sounds great! What could go wrong?
Jimtac@reddit
Don’t forget that the big certificate issuers all have their own version of an automated certificate inventory management system that they are conveniently selling at inflated rates as this date approaches.
itsallahoaxbud@reddit
Exactly one of the reasons I did retire. We had over 6,000 certs.
Vicus_92@reddit
Some things can't be automated, and it's going to be very frustrating....
The slow decrease down to 47 days will help force devs to react, but until then it's gonna be annoying for the 1% of things that can't yet be automated.
S3xyflanders@reddit
I’m hoping someone sees this—apologies for the long post.
I’m a Network Engineer, and for whatever reason, our team owns the certificate lifecycle. That means we’re responsible when other teams don’t rotate their certs on time. This originated from a former coworker who centralized everything around NetScalers, and even though they’ve been gone for a while, the responsibility stuck—now it’s mine.
Our current internal CA is managed by another team and is frankly a mess. I understand the basics (issuing certs for things like RDP to avoid warnings), but I’m not deeply experienced with ADCS and I'm afraid if I try digging into it, it now becomes my responsibility
Right now we’re juggling three vendors: GoDaddy, DigiCert, and Sectigo. We manage about 90 certs, mostly wildcards. The process is inconsistent—GoDaddy supports auto-renewal, but Sectigo requires reordering with a new CSR, which is frustrating.
Our workflow is manual: download the cert, convert it to PFX, upload to NetScaler and Azure Key Vault, and let pipelines handle Azure deployments. The actual work is quick—10 minutes or so—but gathering certs, passwords, and coordinating everything takes most of the time.
Long term, I’d like to rebuild our internal PKI and limit external certs to public-facing services. Right now, we’re overusing external certs because our internal CA environment isn’t in good shape and no one wants to own it.
Has anyone implemented something like Venafi? I’m interested in moving toward a self-service model where developers can generate their own certs, with integrations into NetScaler, Palo Alto, etc.
One challenge is third-party hosting—there’s no automation there. We still have to upload certs via FTP and rely on them to deploy, which is painful.
Appreciate any insight. We’re a small team (3 people), so it’s been hard to prioritize fixing this over day-to-day work.
Responsible_Law_6353@reddit
I just learned about this. This is so fucking stupid. Im already hearing people talking about going to self signed to avoid this shit.
Ace__Rimmer@reddit
Welcome friend - You have been conscripted into the Dharma Initiative.
At some point I fully expect to be locked in the office, updating certs every 108 minutes.
eufemiapiccio77@reddit
You don’t have to go along with it
bitslammer@reddit
Nothing could be farther from the truth. The group who decided this are the ones who have a financial stake in certificate issuance and renewal.
mixduptransistor@reddit
But you can get free certs these days?
BlueWater321@reddit
Free certs for now.
mixduptransistor@reddit
You think Let's Encrypt is going to pull the rug and start charging?
BlueWater321@reddit
I don't, but it's not impossible.
port25@reddit
I kind of do, yeah. Who funds them? Their user base and costs are going to balloon.
mixduptransistor@reddit
Well they're a non-profit, so if they were going to rug-pull and start trying to make money they'd have a hard time. They are sponsored by the EFF, Linux Foundation, University of Michigan, and then grants from Mozilla, Cisco, Facebook, Google, and AWS.
They are very well funded at this point and have done a lot of technical work lately to increase their efficiency so that they can handle significant increases in usage without having to scale up their infrastructure. I would not be worried that they are going to start charging
bitslammer@reddit
True, but my point was that the CA browser forum is not a "random group" but are in fact a group of representatives from companies who have a financial conflict of interest whether or not they are exploiting that.
mixduptransistor@reddit
They are the companies that represent both sides of the coin, both the browser vendors and the CAs. The browser vendors are the ones who pushed this hard, and they don't have a financial stake in shortening the lifecycle
recoveringasshole0@reddit
SHUT UP EVERYTHING IS A CONSPIRACY!
/s
sembee2@reddit
They didnt want to do it. Apple basically told them that they would only accept 47 day certificates from a certain date and the browser forum had to fall in line. This is almost exclusively Apple's doing, with I think Google support.
Frothyleet@reddit
I don't have any inside tea here, but I am pretty skeptical that Apple would have the leverage to "force" everyone else to their preference (unless everyone else was pretty comfortable with their suggestion).
If the rest of the industry consensus was "nah", and Safari was the only browser that started whining, I don't think other vendors would be pulling their hair out.
SkitzMon@reddit
Most automated 'solutions' break the assurance that a certificate is held by a vetted 'real' business. No real vetting will occur once they need to be renewed monthly.
Would you trust a bank with a 24 hour old Let's Encrypt certificate?
Forcing OV web certs into this circus is a race to the bottom.
MedicatedLiver@reddit
My problem is needing DNS challenge and 80% of the damned software out there not supporting anything outside of HTTP validation. FFS.
shokam_scene@reddit
Can anyone share some tips or direction towards automating cert renewals on RD Gateways and Websites (wordpress/cpanel) on shared hosting?
Swimming_Office_1803@reddit
Did a powershell for RD that runs as an after renewal action in the “encrypt the web” client.
Think 10 lines was enough for the basics, had more code in there for quality of life like fail alerts and logs than for actual function.
shokam_scene@reddit
Is that 'certify the web' ? That's 59$ USD and costlier than what a 1 year certify was. Cheers for the info I'll check it out.
Swimming_Office_1803@reddit
Ah yes, that’s the name. Sorry, mixed let’s encrypt and certify the web.
There are probably other products that can do triggers after renewal, I just haven’t looked for them.
It isn’t cheap, but the scale we’re using it at and the upcoming product for a single pane of glass of all the certs we’re handling globally, time saved and ditching paid certs makes it worth the 2k/year, at least for now
HJForsythe@reddit (OP)
I think cPanel widely uses letsencrypt doesn't it? So isn't that already in theory automated? I don't know about RD gateways because luckily I haven't encountered that.
shokam_scene@reddit
There is an autossl plugin but that's not reliable wherein it will renew ok a few times but fails randomly which is why we pivoted to 1 year certs via namecheap. Namecheap ssl manager plugin fails to install as its shared hosting and we dont have root. Hosting support is clueless and trying to push another solution costing 10$ p.m.
Dosarola@reddit
We tried certbot, integrate with ansible and ACME, and although doable, still required a bit of work. Windows had certify the web that also worked, but still required work, we are settling on Cyberark Cert Manager (formerly Verify) and integrate with our PKI solution.. more to come
Single-Virus4935@reddit
For some of my services I switched to 6d expiration, also added CAA with le+account and CT monitoring.
TechPir8@reddit
Automated renewals will get exploited and the admins will not be paying attention because the process is automated.
Watch and see.
I_NEED_YOUR_MONEY@reddit
Certbot is 12 years old. We’ve been watching, and seeing. It’s fine.
pixel_of_moral_decay@reddit
Not really true. We have seen it, just in less obvious ways. Most DNS providers for example don’t have ACL’s granular enough for just certbot validation.
Compromise the host, and you have the API key to control DNS of the victim, and that’s been a problem for years now.
tha_passi@reddit
That's why soon we will have DNS-PERSIST-01: https://letsencrypt.org/2026/02/18/dns-persist-01
pixel_of_moral_decay@reddit
I hope one day it’s real, but for now it’s still vaporware
tha_passi@reddit
From that very blog:
Also see https://github.com/certbot/certbot/issues/10549#issuecomment-3929824817:
pixel_of_moral_decay@reddit
Duke Nukem forever was targeting the early 90’s.
tha_passi@reddit
Sure ok. Luckily this is about LE, and so far they've had a pretty good track record of staying on schedule.
Cyhawk@reddit
True. This is when you need to write up a business proposal that your current DNS provider doesn't match evolving business needs and lay out exactly why using the current provider is costing X amount of man hours every week and why switching to say Cloudflare is a better choice, saves money and saves time and potential future cyberattacks by having fast and easy access to their anti-ddos platform and so on.
We don't always have to do things the hardware. You just have to justify the changes in a way that a business guy can understand.
Frothyleet@reddit
Well, OK - that's solvable by using a provider who offers modern features. I don't like Cloudflare's overwhelming market share, but it's hard to say no to very robust functionality that's also free.
Sure, if your infrastructure gets owned, you've got a problem. That's always gonna be the case.
In this situation, you have to treat that API key as Tier 0 - that means in a proper setup, it's not being stored on anything facing the internet (like, you don't need Certbot running on your actual webservers), and even behind your DMZ there are all sorts of just-in-time PAM solutions to let your scripts retrieve sensitive secrets.
Well, yeah. That's just good practice period - your MDR should be watching your DNS.
Genuinely not throwing shade at you, I know how SMB life is, and many things that suck in our environments are not by our choice.
However, this and other complaints largely boil down to "it's a pain in the ass that we have to make our infrastructure better align with industry best practices" (see also: M365 basic auth deprecation).
pixel_of_moral_decay@reddit
The problem is one compromised host should never compromise your entire domain.
And most DNS providers simply have come to the conclusion that it’s not their problem.
Frothyleet@reddit
I mean, that's the status quo for a massive amount of infrastructure. Like anyone using on prem AD.
But like I said, it is not a difficult endeavor to layer your sensitive secrets - like DNS API keys - behind multiple layers of security, such that even a compromise of the host that is running your ACME scripts doesn't expose the key.
OK, I guess? Just... use the ones that don't suck? Again, Cloudflare is literally free for this functionality. And it, and other good DNS providers, are cheap even if you need to pay for them.
I know that migrating nameservers can have varying levels of complexity depending on the scale and functionality of your environment. But 9 times out of 10 it boils down to "export zone file. Import zone file. Update NS records with registrar". Not a huge undertaking.
MairusuPawa@reddit
Certbot is fine, but judging by the comments in this thread, the humans simply aren't.
Metalfreak82@reddit
Yes, this is what I expect too. And because it has been over a year ago that you set it up, you first have to dive into how it worked again... And always this stuff happens at the wrong time.
wtathfulburrito@reddit
Happens all the time. “It’s on a task that hasn’t failed in a year, I didn’t know it was broken til today”.
lynsix@reddit
All CA’s will be introducing ACME challenges for renewals. You can use other tools such as Azure KeyVault for example supports DigiCert and can be used to help replace old certs and manage access to them.
This is ultimately a good thing. Initial headache for some but massive time saver in the end.
The biggest problem is going to be bad software with archaic ways to replace certs, or ones that can only be done by vendor support teams.
stromos@reddit
Ding ding ding the automation is a breeze for normal stuff Cloudflare can automate sites by itself. It’s the crap like appliances and legacy software that makes it a nightmare. Then even worse vendor controlled.
GreatGreenGobbo@reddit
I'm an application level PM. I did not know this was some global standard.
Last year I had a few projects impacted because our DEV env certificates would expire and it wasn't on EMs radar. Somehow it was supposedly on the software dev team to know and keep it updated.
Frothyleet@reddit
I mean, setting aside the reality that so many developers have no idea how PKI works...
Why wouldn't it be on the software devs to know how the certificates in their environment work?
GreatGreenGobbo@reddit
Project based, not in house devs large corporate insurance provider. We don't own the envs just given them. This 100% needs to be on Env Management/Middleware. We're there to code, test and deploy.
Direct-Expert-4824@reddit
Looking forward to having to deal with the fallout from compromised certificate automation solutions. /s
robreddity@reddit
Puts a ton of power into the hands of the CAs.
im-feeling-the-AGI@reddit
I’m working on a tool specifically for this issue. It’s free.
certctl - Self-hosted certificate lifecycle automation platform. Any CA, any server, zero human intervention. Full REST API, web dashboard, and agent-based deployment where private keys never leave your infrastructure.
https://github.com/shankar0123/certctl
ferrybig@reddit
Let's encrypt documented their standard as ACME: https://en.wikipedia.org/wiki/Automatic_Certificate_Management_Environment
There are 2 certificate providers I know that work with this:
chris-itg@reddit
There are tons of providers that support this with certbit via different methods not just zero tier or let’s encrypt. I’ve done cloudflare, sectigo, google domains (prior to the sell), Amazon just to name a few. Read the docs.
c_pardue@reddit
op you keep mentioning in replies that "this doesn't even solve the underlying issue" but i don't think you give a single F about the underlying issue, you are just annoyed as hell at having to cope with this latest travesty of random changes.
yeah we get it, it sucks.
some of us don't care, some of us now will just have to fix it, and some of us have no input other than pointlessly complaining.
i am with you in your camp, pointlessly complaining. honestly i don't think this will even solve the underlying issue so what's the point (ie. please somehow don't make me deal with it)???!!!
Only_Worldliness3870@reddit
My problem with some of the automation is DNS providers that don't have an API to update the record to be able to do automatic renewals. Or the ones that have an API but a long time to propagate the new information. My current DNS provider you have to manually add the records, and they say it can take 24/48 hours. Most of the client servers that I manage are automated and have been, but they are not doing the DNS validation. They are using http validation.
Frothyleet@reddit
Cloudflare is literally free. Export your zone, import your zone, update your NS records, gratz
I mean I'm being a little facetious but if your problem is "my DNS provider sucks", switch to one that doesn't. It's not like it's a money problem, they're all cheap if not free in the first place.
daschu117@reddit
You can CNAME the acme challenge record to a separate domain that does have a better API. That way the actual A/MX/NS/CNAME records you care about stay with whatever DNS provider you're currently using, but then the specific TXT records for the DNS-01 domain validation can point elsewhere. That secondary domain is just for TXT records and has no actual control over anything else. It can also be hosted on any other DNS provider, not necessarily the same one your main domain is on.
My favorite method is running a service to create per-domain credentials on a secondary domain that I own. This also abstracts my DNS-01 automation away so that I can change my main provider without having to change all of my certificate automation credentials.
https://github.com/acme-dns/acme-dns
Only_Worldliness3870@reddit
Thank you will have to check that out.
DDS-PBS@reddit
"I'd rather just retire than learn how to automate things"
Normal_Choice9322@reddit
Automations don't magically last forever with no interaction required
FloridaIsTooDamnHot@reddit
This is a fairly ridiculous statement. Nothing in tech lasts forever with no interaction required.
In fact life doesn’t last forever with no interaction required.
Normal_Choice9322@reddit
I automated a year ago and now they are getting rid of the product so I get to do it all over again
FloridaIsTooDamnHot@reddit
That sucks and I’m sorry your company put you through that, but it has nothing to do with automation needing care and feeding.
Normal_Choice9322@reddit
Cool story? "Just automate" isn't some silver bullet
Cyhawk@reddit
Choose a better automation tool. Certbot has been around for 12 years and funded by the EFF, its also free to use. Its not going anywhere anytime soon.
You bought an expensive Harbor Freight screwdriver and are surprised when it breaks on you?
Normal_Choice9322@reddit
Are you dumb? They run certbot in the back end
streetmagix@reddit
Then have some decent monitoring.
You ARE monitoring your systems right?
Normal_Choice9322@reddit
Of course. So what
Spokezzy@reddit
What do you mean so what?
So you have monitoring, in the unlikely event your simple script to rotate the cert fails you have plenty of time before it expires to resolve the errors.
This is bread and butter stuff
Normal_Choice9322@reddit
Monitoring does not fix the problem that can occur across many servers every month
streetmagix@reddit
Then monitor your certs, and if its getting close to expiration you start investigating why the cert wasn't refreshed in time.
Normal_Choice9322@reddit
Yeah no, that's literally the problem ffs
ledow@reddit
If it doesn't happen, you have a good portion of 47 days to get it working again.
How is that different to anything else automated?
Normal_Choice9322@reddit
Nothing else is hitting me every 1.5 months
ledow@reddit
It's not hitting you at all. You just run a tool on a schedule.
And really?
You don't have a monthly bill for Azure, Microsoft licensing, etc.? That if you don't pay, things get cut off? Sure, it might be happening in your finance department, not IT, but it's there. Phone bills. Service bills.
Yeah, some of it can be annual, but nowhere NEAR all of it, and almost all of it cannot be automated.
This can.
Normal_Choice9322@reddit
Yes it is because something inevitably breaks or they change products and you have to redo the work. My monthly bills don't require a manual intervention
Spokezzy@reddit
Sure but the card that you use to pay for them probably has an expiry right? So eventually there comes a time where you do have to manually intervene when you are notified of that?
I dont see auto-rotation often enough that its a burden once its set up..
Normal_Choice9322@reddit
... so once every few years a card expires? Be for real this is not remotely similar
_mick_s@reddit
My automations for certs have required less work then manually renewing those domains every 2 years would have.
throwawayPzaFm@reddit
We're talking mainly about increasing the interaction gap back from 49 days to 365 days. Automation is very likely to last 365 days with no contact.
Normal_Choice9322@reddit
I don't have to write it, I have to configure it for every interface
Moontoya@reddit
*"I'd rather retire than deal with this bullshit on systems that can't be automated"
Old shit, broken shit, managers being shit, policies preventing automation, dude bro ai flunkys, lots of reasons why it's not as simple as 'just automate it brah'
throwawayPzaFm@reddit
Then they're allocating manpower to replacing certificates. Feel free to get a better job if you have the skills to do something else.
Moontoya@reddit
I'm a senior engineer at an msp with 30 years under my belt
I'm still supporting server 2012r2 all over the place and hardware even older than that , entirely because the client can't or won't upgrade.
Your thinking is monopolar
throwawayPzaFm@reddit
Is it? Are you not allocating budget to manually supporting broken down old crap?
Seems to me like you agree with me more than disagree.
Moontoya@reddit
_I_ am not allocating shit to any budget
Im the fix this shit guy, not the owner or management of several dozens of companies in the SMB (small-med Business, not the share type)
Lots of FREE tools for doing it ? Cos if theres a cost at all, it wont fly with the money people.
I deal with a LOT of cassandrean behaviour, I can tell them the truth all day long, warn them of problems, tell them they need to spend money - and they wont/cant hear it or think Im lying or trying to generate a sale.
My point is - theres a lot of crud out there still in use that automation isnt a quick / easy / smart or cheap option for - which is very different to saying automation is useless.
throwawayPzaFm@reddit
Well maybe not lots but it's still very doable. posh-acme for instance seems to work, though I've escaped that particular level of hell for now so can't guarantee it.
Moontoya@reddit
Being hamstrung by the money people is one of the reasons automation isn't as easy as it should be
I enjoy my job, mostly, it's frustrating knowing the right thing to do and being stymied by the stupid and or vindictive
throwawayPzaFm@reddit
Never spent much on it tbh. Took a lot of work back in the day but these days half of it is already written and either Codex or Claude will happily write the rest for 1 cent.
Centimane@reddit
"I also choose this guy's retirement"
UntrustedProcess@reddit
Well, once you hit mid to late career, "I would just rather retire" is a quite natural feeling to every minor inconvenience.
arwinda@reddit
Naaa, I'm around that age, and I automate the shit out of this crap. I don't want to repeat mundane tasks every so often! Can spend my time with more interesting tasks, or just gain more freedom.
streetmagix@reddit
I'm mid career and I haven't given up learning new things and keeping my skills up to date. I'm actually making a point of expanding my knowledge now I'm more settled, not just the minimum required learning.
I do not want to be Dick Van Dyke in that episode of Scrubs.
HJForsythe@reddit (OP)
The concept is pointless. If SSL certificates are so poorly thought out that they must be rotated every 49 days then they should be done away with entirely. Just making them expire faster isn't solving a problem. So you just automating bullshit isn't a solution.
oxidizingremnant@reddit
I think you’re missing the forest for the trees here.
TLS encryption is important but previous methods to invalidate improper/invalid certificates (such as OCSP and CRLs) just didn’t work. So rather than relying on broken tech, the solution is to just revoke certificates faster.
The creep toward shorter certificate periods has been coming for at least a decade, so honestly if you’re dealing with legacy tech that doesn’t support certificate automation at this point then don’t get mad at W3C. You should get mad at whoever keeps buying legacy stuff that hasn’t been keeping up with decades-old technology.
WDWKamala@reddit
This is a very valid and uncomfortable point.
All they’ve done here is put an obnoxious bandaid on a rarely impactful scrnario.
Auno94@reddit
Sounds good, who is documenting it?
nerd_at_night@reddit
Does someone have a great script to exchange my vCenter cert automatically?
Frothyleet@reddit
https://knowledge.broadcom.com/external/article/318946/how-to-use-vsphere-certificate-manager-t.html
LastTechStanding@reddit
For the amount of $$ you pay that company I’m sure they can help with setting up acme
Cyhawk@reddit
Broadcom's response"
https://giphy.com/gifs/southparkgifs-3o6Ztp4hI5dPBKSzQc
LastTechStanding@reddit
Checks out
Fun_Structure3965@reddit
you should not use public certs on your vcenter in the first place
WraithCadmus@reddit
I can automate it all (I do so on my own systems), except for our VMware NSX-T, where I cannot for the life of me find an API.
Frothyleet@reddit
I'm not familiar with that tool, but for crappy stuff that you can't replace, you can still achieve automation via RPA. Even if that's very much a band-aid.
pbrutsche@reddit
You might be at the point of running a private, internal CA for internal stuff.
Sudden_Office8710@reddit
Thats karma telling you to leave VMware for Proxmox. vCenter is a major pain in the ass you can’t automate that shit actually if you have any 6.5 recently the only option was to upgrade to 8 and all your shit is toast until then. Fuck Broadcom I know I’m way behind the times on that particular cluster but damn the system was rock solid for so many years and then just dead and forced to migrate. It’s not cool
pbrutsche@reddit
If you're in an organization that needs NSX or NSX-T, Proxmox is a half assed feature deficient toy and an absolute non-starter
VMware is more than virtualization
Xzenor@reddit
Why do you think it is inadequate? It's absolutely not.
secesh@reddit
random group of folks? you mean the makers of web browsers and certificate authorities?
I'll trust the industry leaders and experts over some random curmudgeon. Let's Encrypt launched in 2014. This writing has been on the wall for over a decade.
Fun_Structure3965@reddit
this, you have all the experts on the pro side for this and all the people who don't understand certificates at all on the contra side.
not so random...
following the ballot discussion on github was exhausting.
Dax420@reddit
If the experts think shorter expiry is better why stop at 49 days? Why not 4 days, why not 4 hours?
The whole architecture is wrong and they are trying to fix it with a bandaid. People complaining are the people who will have to deal with the mess and the "experts" who sell certificates for a living get to sell more certificates.
Frothyleet@reddit
The organizations who charge people for SSL certificates are actually on the losing end of all this, because almost all of their customers are people who are manually messing with certificates because of their stunted skillsets.
For the set of people who are forced to learn some basic certificate automation, they're also probably going to start asking themselves why they're paying for certificates.
Fun_Structure3965@reddit
thats called "practicality" and no, there aren't only CAs in the cab
Spicy_Poo@reddit
Like Symantec.
DueBreadfruit2638@reddit
This is a non-issue for me. Implemented simple-acme years ago and haven't worried about SSL/TLS certs since.
Flabbergasted98@reddit
We can't have have late stage capitalism with naysayers like you around.
Keep talking like that and they'll replace you with AI.
Cyhawk@reddit
Funnily enough, this type of task is something agentic AI tools can do really, really well.
HJForsythe@reddit (OP)
Dont threaten me with a good time.
pabskamai@reddit
Hugh, jokes on them :( In Our erp you have to manually install the cert….
Cyhawk@reddit
Ansible/FTP/Reverse Proxy not an option?
Oddly enough, I've been trying to find use cases for Agentic AI (Hermes, Sierra etc, Hermes is the winner by lightyears if you look em up). This is one that would actually work well for its capabilities. Login, click specific buttons, upload a specific file. Verify & notify. Hmm, I wonder if I have anything that needs manual updating these days.
s0uthpar@reddit
At the end of the day, what I cannot understand is: Why is it up to the browser (or a forum) to decide what level of risk is appropriate for a site. Shouldn't the owner of the site be able to make that decision themselves?
This whole situation is absurd. Automate, sure, whatever. It doesn't matter. There are always going to be cases where it won't be possible due to vendor support or who knows what. Things WILL go wrong and it's only going to make life more difficult.
So yes, like almost everything in IT these days, this change absolutely makes me want to retire.
jefmes@reddit
I'm 48 now, and have been doing IT work in some form or another for 30-35 years, and I just quit my job in November. It's not an exaggeration to say cert management and the coming cert-pocalypse is one of the reasons I got so sick of all of it. The "well just automate it!" folks are living in their home labs and have not worked in critical production environments, apparently. Vendors suck, applications are outdated, corpos don't want to pay for upgrades, and you can't proxy everything. Someone below mentioned how so much of the job is now "security theater" and damn, yeah that resonates!
I understand the security implications and why it's being done - I'm not arguing against it with the current system we have. But if does feel like it's a big ass band-aid for a larger problem, and I'm sitting in an ACM seminar on a quantum-native Internet architecture right now to understand the issues around the coming quantum computing security implosion. This cert cycling issue all feels EXTREMELY performative especially in this new era of AI-fueled attack tools and increasingly unscrupulous agencies and governments.
Props to those of you who enjoy that work still and love tinkering with every little configuration to try to make it just right...but I think some of us are feeling ready to age out of this waste of time and energy.
iamabdullah@reddit
Are you a dinosaur?
jefmes@reddit
I do think I'm getting a bit scaly, hmmm
strawzy@reddit
Fantastic points all round here. Especially share the frustration about the "just automate it crowd" I work for an MSP and some of the client systems are either incredibly locked down in OT, massively outdated, but usually both at the same time.
It's also tough explaining to directors who aren't technical that the process we've been doing with them for years is changing and the reasoning behind it.
Only been working in IT 10 years and I can already feel myself yelling at the cloud more and more.
romu006@reddit
I'm not at all working with vendors and doing administration, but can't they use a private CA instead of a public one? (Of course that brings a whole lot of new problems)
robotbeatrally@reddit
Are you just retiring or you have a new game plan? I'm 18 years in, and I'm struggling with my Pidgeon holed specialized knowledge in my very small industry corner of i.t. Feeling kind of lost just trying to get the same certs everyone else is. I wish I had something more specialized (that actually made money though unlike what I do now).
jefmes@reddit
Just taking some time for now, dealing with some family health issues, working on the house, those "fun" things that I didn't have time for when working too much. :) I think reality is that I'll end up back in some form of IT role out of financial necessity, but I don't know that I'll go for an Operations role again. I've always been more Systems and Apps focused, so being able to work on a single type of system/platform along side a business unit, maybe in a more "Applications Analyst" type of role would be more tolerable. I'm also brushing up on some of my computer science foundations, studying current GPU and Vulcan rendering developments, diving harder into Linux than I've ever had time to do previously for my personal use, and rebuilding some old PCs clear out some of the old tech!
But...I'm looking at all sorts of other fields too. Every science basically uses some form of computer science now, so a tech nerd can find a way in just about anywhere, if you're focused on it. At some point you have to just choose what's more interesting to you personally IMO, otherwise work and life will become a drudgery. I'm lucky to have enough funds to let me take my time a bit, but I may have to broaden what I'm willing to do after summer. Long story short, I'm still trying to figure it out!
robotbeatrally@reddit
Ah kind of reaching the same conclusion (about the second paragraph there). Just haven't really zeroed in on anything yet. Thanks for the thoughtful reply and encouragement.
HJForsythe@reddit (OP)
Yes, I am basically exactly the same as you. 30 years of this. On top of this SSL issue just feeling like some unseen hand making dumb decisions most of my job is now just noticing that a vendor broke something and then arguing with them to fix it. Oh shit my Veeam backups stopped working because Crowdstrike pushed a shit update last week and now I have to literally wrestle with Crowdstrike to get them to do jack shit about it.
gordo32@reddit
Yep, and letsencrypt, which manages a vast majority of auto-renew certs is a US-based org.
Time to stand up similar infrastructure NOT in the US
VoodooKing@reddit
At 45 yrs old. I'm done with IT. When my renewal notice came up. I decided I'm not going to do this shit anymore.
03263@reddit
Where you headed? I'm still in it for now but considering options once mortgage is paid off. Mail carrier sounds nice.
VoodooKing@reddit
I'm from Singapore. I certainly took some time to think about renewing my contract. This 49 day SSL thing was not the only reason that drove me, it was many other reasons too, the demands of the customer (government), the demands of my company, after hours and weekend maintenance. I'm really grateful for the knowledge I have gained in the 25+ years I have been in IT. Many of the younger admins ask me for help and advice which I'm always happy to impart.
Currently I have another source of income coming in that matches what I'm making so I can actually retire but I don't want to get bored.
I'm going to take a few months break to just recuperate and spend time with my nephew and niece.
I'm exploring a few options,
1) Train station worker :- Basically sitting in a glass booth and helping passengers with issues tapping out of the gate and any other tasks related to smooth running of the train station.
2) Part time 7-11 employee
3) Part time Subway employee
4) Private Hire Vehicle driver (Similar to Uber)
uptimefordays@reddit
I think this is a fundamental misunderstanding of what went down--companies insisted, for years, that CRLs couldn't be enforced because generating new certs and revoking compromised ones was too hard. So the industry said "well fine, we'll just decrease validity periods" which was a reasonable approach.
FostWare@reddit
But it’s the same CAs that skimped on protecting their CRL (and OCSP to a lesser extent until long lived caching became the new SOP) service from DDoS resulting in people’s browsing going slow, or just straight timing out.
uptimefordays@reddit
That's a real failure, but it's a separate one—CAs under-investing in OCSP/CRL infrastructure and cert holders failing to actually submit revocations are two distinct problems. Revocation broke for layered reasons: CA infrastructure was unreliable, holders dragged their feet on submitting requests, and browsers eventually soft-failed on timeout just to keep things moving—which gutted the security value entirely. Nobody's hands are clean, but that doesn't contradict the original point about why short validity periods became the forcing function.
ecnahc515@reddit
To be fair, shorter expirations also means the CRLs don't need to contain entries for as long which should help with that, but also there is going to be some increase just due to more frequent renewals so it's not necessarily a huge win.
Tutorbin76@reddit
Just wait until these CA's start demanding payment per renewal, which is likely the real objective here.
Stryker1-1@reddit
For the low monthly fee or X you can continue renewing your certs
GreenAmigo@reddit
Not in tech but the people in government havent a clue... want to ban vpns but they are how digital tech works , remote work cant really be done with out it....can the internet work with out vpn and becoming a ball ache of password logins etc.
03263@reddit
Simple fix bro just run your own CA.
don't forget to fork and maintain your own CA software when upstream drops support for long term certs
this is especially easy to retrofit into legacy systems!
Riist138@reddit
Hi there! Former sysadmin, current Vulnerability Management Specialist here...so, there were some good explanations as to how to set it up, but I didn't see any explanations as to why this change was made from a security standpoint. The main reason is it reduces the blast radius of compromised certs, as stolen certs will expire quickly. Existing revocation systems are often unreliable, short lived certs serve as an automated, temporary alternative to revocation.
Another reason for this change I don't see discussed often is the preparation for post-Quantum cryptography. Shorter lifetimes allow for faster transitions to stronger cryptographic standards. This is going to be essential in the future as new quantum threats emerge.
Start making a plan to transition away from any manual certs you have, in the very near future, it's going to be critical to automate cert rotation (as others have said).
HJForsythe@reddit (OP)
Okay dude but my entire point was that if the whole idea of certificates is so stupid that they cannot be trusted for more than 47 days then fix that.
Riist138@reddit
The problem isn't due to certificates being "stupid"...they're one of the best ways we have to ensure data has not been altered in transit. The change has much more to do with a rapidly evolving threat landscape,, and the longer certs stay active, the higher the risk is of compromised keys, persistence of misused certs, outdated cryptography, orphaned and forgotten certs (often used in impersonation attacks). Old certificates also facilitate AITM and Downgrade attacks, attackers can force fallback to insecure protocols (such as TLS 1.0/1.1) or weak cipher suites, exposing data to interception.
VTi-R@reddit
Explain how you will prevent misconfigurations by admins who invariably seem to claim they're super smart yet end up having the same compromised password everywhere because "no-one could ever guess it so I'll reset it to the same thing every month rather than change it"?
Include a discussion on how you'll prevent any private key from being copied by root (on a Linux) or Administrator on Windows (hint: the exportable flag is an absolute nothing for security).
protogenxl@reddit
the SAP BASIS team is reconsidering their practices.......
Disastrous_Meal_4982@reddit
As someone who was a cert admin responsible for hundreds of thousands of certs and an engineer responsible for deploying them, I pushed for 30 day certs for years. There were private keys floating around that were valid for a decade when I took over. We are now at a year with admins having to validate their certs are valid every 90 days or they get revoked.
wrootlt@reddit
As i am reading Let's Encrypt blog how they are designing systems to cope with huge numbers of certs/checks/renewals i just wonder when it will inevitably crumble and drive the world into darkness. It doesn't seem that current approach and technology is sustainable. Billions or trillions of certificates relying on a single entity. That is not what Internet is supposed to be. But it seems Let's Encrypt is trying to monopolize this thing.
fdeyso@reddit
And nowadays having an ssl cert doesn’t mean anything they give it out to anyone, even rnicrosoft.com (RNicrosoft) had a cert issued.
Frothyleet@reddit
This is the exact reason why all modern browsers, years ago, stopped highlighting EV/OV certificates and changed UI indicators saying things like "safe". Now, the UI is simply quiet "normally" (where normal = good TLS handshake) with warnings if your connection is unencrypted.
Frothyleet@reddit
Yes. Certbot is just a popular tool that implements the ACME protocol. There are many tools that can leverage ACME, or you can build your own, and there are a number of providers besides LE that use ACME now.
surleybear@reddit
You are missing the other half of this, we are going to be required to validate our domain every 30 days with cert vendors also. DigiCert is already out in force peddling thier DNS solution they just bought that can automate it.
Geekenstein@reddit
Much like passwords, if you make this painful with constant changes, people will work around it in a way that’s much less safe.
suburbanplankton@reddit
I'm not worried in the least.
We have a whole team that's currently devoted to automating certificate renewals, and I'm not on it! :P
newked@reddit
I am hoping for daily replaces, modern http routers have no issue with this, legacy infrastructure has.
greenFox99@reddit
Have a look at ACME. I think it is implemented in hashicorp vault. Your certificates can get renewed automatically using cert bot, however you need to configure what server to use.
Shot-Bag-9219@reddit
yeap! e.g., https://infisical.com/docs/documentation/platform/pki/ca/acme-ca
ayeshrajans@reddit
It's not some random group of folks. It's the CA/B forum, which is perry much THE group that decides all certificate rules, just like every other rule before this.
There is a newer DNS verification method proposed that you can do manually and it will remain verified as long as you do not change DNS (I crudely simplified this), so you only have to automate the certificate renewal and not necessarily the verification part.
I personally like that we shorten the duration, but I'm managing my own infrastructure and it's simple enough for me to do it. For larger infra, I can understand that this can be pretty annoying.
poopooonyou@reddit
Something I haven't seen mentioned is that quantum computing is coming, and it can break encryption. Encrypted data is being stored today in the hope of being decrypted and read in the near future.
Reedy_Whisper_45@reddit
I automate almost everything I do more the thrice. But some things, like some of the certificates I maintain, are not subject to automation, or the effort to automate would make most want to retire rather than face it.
OP's complaint is valid. I can certainly agree with him. I have one system that uses a java (may it burn in heck) backend that I have yet to figure out how to automate. I'm not looking forward to doing that by hand every 49 days.
And adding an internal keystore and distributing keys internally may be an answer, but it's not an answer I like. I've never needed to before, so it's another "thing" to do.
Excuse me while I go out and yell at those lousy clouds.
genericuser642@reddit
Can you slap a reverse proxy in front of it? That's how I'm planning on dealing with my problem children.
macprince@reddit
Is this system public facing? Put it behind a reverse proxy that handles the TLS and ACME for it, like Caddy.
DubsNC@reddit
Hackers love this one trick!
Did you read the Snowden files? NSA owned Yahoo because their infrastructure used this. I encrypt everything I can at the source.
macprince@reddit
OK, good for you? Ultimately the answer is that people need to move off all of these systems that make automatic renewing of TLS certificates difficult to impossible.
NoPossibility4178@reddit
Just ask ChatGPT to migrate your applications to python or something lol.
NightOfTheLivingHam@reddit
is caddy better than nginx for these things?
macprince@reddit
I think it's easier, certainly. You can have a working reverse proxy with automatically renewed TLS with a two line config file. (And the first line is literally your hostname.)
NightOfTheLivingHam@reddit
ooh that's nice.
iamabdullah@reddit
It's insanely easy to automate certs on Java, it's about 2 commands.
StrongWind1@reddit
If the system is not public facing on the internet then use an internal cert signed by your internal CA for 365 days just like you have been doing. If the system is public facing and needs a cert for a web server, setup a reverse proxy with nginx if you need advanced config and use certbot (or my favorite: Lego ACME client) or simplify and use Caddy.
This should not be difficult. If you need a valid public cert for another purpose certbot/lego and automation with ansible or bash or python got you covered. I have 10+ websites professionally behind caddy with zero issues and automatic certs, I have 5 internal systems that need public certs for various reasons and I am using lego with dns to pull the cert using a bash script then calling python to push the cert to the system. Is this fragile, maybe but it is better then the current process of doing it manually. This also includes an SMTP server where I replace the cert and restart the service - it is actually the easiest one to automate!
axonxorz@reddit
If you're doing it internally, there's no broad restrictions on cert validity.
47 days only applies to certs in the public trust chain:
HoustonBOFH@reddit
If it is internal, just turn of https...
lopahcreon@reddit
And if you’re using a Java keystore, then you need it to be password protected for obvious reasons. Of course, automating updates to a password protected keystore has its own security implications…
Reedy_Whisper_45@reddit
Yeah...
danekan@reddit
Did you ask ChatGPT?
Reedy_Whisper_45@reddit
No. I have yet to get anything truly useful out of AI tools. I trust them less than I used to trust interns.
danekan@reddit
So you can’t look at a five line script it gives you and determine if it would work or what it’s doing?
I think you’re all set to retire then!
eaglebtc@reddit
Utah Mormon spotted
Reedy_Whisper_45@reddit
Actually, a New England Baptist, but I can see how that conclusion comes.
eaglebtc@reddit
Ah, so a witch-burning Puritan? :-D
taintedllama@reddit
Why do you need a public cert for a backend system?
Mechanical_Monk@reddit
Well at least introducing certbot as a single point of failure in ALL major infrastructure cannot possibly go wrong because certbot is open source and open source software is never targeted by nation state hackers or compromised in any way because it is open source.
ecnahc515@reddit
There's a least a dozen alternatives to certbot. Most modern web servers and reverse proxies support ACME directly.
snugge@reddit
The upside might be that it kills off the cert mafia!
FrierenAppreciator@reddit
Follow the money. This isn't corporate stupidity. It's pure greed.
Creshal@reddit
The ACME protocol is over ten years old. Some CAs already adapted to technology moving on from having secretaries filling out forms on paper, the rest can die if they want to.
TheJesusGuy@reddit
Yea sure I'll sod off the next 40 years of work and retire. Cheers.
qpxa@reddit
Our load balancer handles it for us
Fuzzy_Paul@reddit
The point is not the 49dayas renewal. The point is that it not stops. Let's crypt is on 6 days ssl. Tech advances and 6 days will become 6 hours or less it does not stop. So when is there a new system that does not relies on buggy software that is updatet because of leaks to drive ssl. The post quantum solutions are there but no international agreement. A big ssl tech should go for it and others will folow. So who is going first!
mrobot_@reddit
The whole topic of certificates just kinda sucks and everything about it sucks, since pretty much day one with the greedy-ass CAs... forcing a proper automation of certificate-rotation might seem extreme, but I can see their point.
If you cannot manage to rotate a certificate in 49days time, there is something seriously wrong.
Not saying it's not a btch and a pain in the behindm but seriously, 49days....
BarServer@reddit
I am more interested in which CAs manage to absolute botch this challenge and recommend their customers to keep updating certs manually... I just had a very limited "behind the scenes"-view when my employer started setting up an internal CA (for IP-Ranges/TLDs you wouldn't get official certs or hostnames/domains which were not to show up in CRLs etc.).
And well.. The market heard of that and we were offered some CAs which were, at that point in time, somewhat well-known. One of them had a fallout a few months later when Google announced they would stop trusting certain Root-CA certs from that CA as they continuously kept issuing certs for Google owned-domains, despite the rules clearly stating they are not allowed to do so. Some of these certs ended up being used for MITM attacks per nation state level actors.. Go figure..
mrobot_@reddit
Honestly, if I had to guess, it's probably just down to greedy-ass megacorps doing megacorp-BS and they are trying to not "allow" some market-standards to be established if it is not their own.
Somehow, the entire CA topic seems almost like half-abandoned to me, in the sense that if I wanted to setup my own CA today then either there is some BS in some cloud-management-site for it, or you get a bunch of cryptic openssl cmd lines thrown at you...... while at the same time literally the entire internet depends on certs as a foundation, the only really "new" thing are these certbots and firefox-letsencrypt-certs, and these been around for a while now. I doubt half the TLS-consuming solutions out there even know what a revocation is nor check for any...
Also doesnt seem to be an interesting field or topic for F/OSS software, creating, managing and rotating these certs... only some super-serious-business "security" megacorp software stacks typically do that in serious-business-organizations...
BarServer@reddit
Yeah, I agree. Also most likely as SSL-Certs were a free money printing machine for 2 decades. As everything was done manually, the Browser CAB Forum wasn't founded or hadn't that reach it has today.
Well there is EJBCA which is OpenSource: https://www.ejbca.org/
And for my homelab I wrote myself some scripts to manage my private CA. Although I recently learned that setting NameConstraints in the Root-CA cert was not a smart idea. :-) Still want to re-write them, but haven't gotten around that.
DeadOnToilet@reddit
There are ACME providers for every modern CA I’ve ever worked with. And frankly if you think this is a bad idea, you should retire. You’re far too out of the loop on the WHY this change is necessary.
The world doesn’t need dinosaurs like you holding back actual, real security progress.
iamabdullah@reddit
OP, you're overreacting and behaving like a dinosaur. It wasn't decided on by a bunch of random people.
ACME has been available since ~2017. Almost all major cert providers support it.
800oz_gorilla@reddit
They weren't random folks, sectigo was a major backer for this and I absolutely gave the rep some s*** about it.
I won't be renewing with them
mixduptransistor@reddit
Well, it wasn't just some random group of folks it was the CA/Browser Forum which is literally made up of both Certificate Authorities and browser vendors. Second, if in the Year of Our Lord 2026 you can't automate certificates on your services and devices, or at the very least put a reverse proxy in front of legacy devices that are hard or impossible to automate, my Brother in Christ maybe it IS time for you to retire
sembee2@reddit
No. It was Apple. They made the CA forum do it because they were going to do it anywaym.
mixduptransistor@reddit
Fair, the 47 day ballot was specifically an Apple proposal but others, including Google, were pushing a 90 day limit but Google supported Apple's proposal. Apple is also on the forum as a browser vendor, not a certificate vendor, so my original point is still valid, the people who pushed it do not have a financial interest in selling more certificates
And, for what it's worth, certificate lifetime doesn't have anything to do with how they're charged. You have been able to buy 5 year certificates from vendors for a long time and certs have been limited to 1 year lifetimes for a long time. You just get a new physical cert when the year ticks over
kanben@reddit
Surely this is as simple as spinning up a modern reverse proxy server with built in certbot support
sembee2@reddit
Apple have been the ones driving this. It wasn't the CA forum. They basically told them that after a certain date they would only accept short term certificates (I cannot recall what they wanted, 10 days maybe) and this was the compromise. As Apple dominates the market, they have dictated the change.
giant_panda_slayer@reddit
Certbot can get certificates from any CA which supports the ACME protocol: https://eff-certbot.readthedocs.io/en/stable/using.html#changing-the-acme-server Google ACME information for your preferred CA and you will likely find that your CA does support it.
zernichtet@reddit
Everything related to SSL/TLS is a giant pile of crap. Literally every automation tool I ever had to deal with is crap. I hate the whole ecosystem so much. Each time I have to deal with certificates I pray that there will be something better to replace it in the near future. I don't know how such a simple concept has lead to that whole clusterfk of an ecosystem. I'm getting really angry just thinking about it :*(
ZestycloseBag414@reddit
If you cant (or dömt want to) keep up with the times i think its a good idea to retire. Maybe this industry isnt for you.
HJForsythe@reddit (OP)
Show me that you dont understand the issue.
ZestycloseBag414@reddit
This isnt an issue. If you put in the work.
Leather-Arachnid-417@reddit
Have to automate it. Its a manual nightmare.
tesselaterator@reddit
What happened to certificate revocation? Mozilla fixed the problem of speed with CRlite. I guess Mozilla is part of the cab? This short life span is a money grab from the CAs Prove me wrong
HJForsythe@reddit (OP)
The real comedy of all of this is that it could be fixed with a TXT record on your Domain.
tesselaterator@reddit
How so?
HJForsythe@reddit (OP)
Everything related to SMTP validation is done in TXT records in DNS. right?
So why can't SSL revocation just use the same process? lol
mtgguy999@reddit
For having access to a comprised cert be useful the attacker still needs to man in the middle your connection. That means when you do a dns query to get the txt record of compromised certs list the attacker can return whatever info they want and not include the compromised cert they are using. If the attacker couldn’t influence the dns queries or ip routing they couldn’t make you connect their there server instead of the real one in the first place. which is the whole thing point having a cert to prove the server is owned by the site you are connecting to and not an attacker.
tesselaterator@reddit
It’s not as easy as that. No smtp encryption is not done with txt records. Listen to this security now episode. SG explains how Mozilla fixed checking for revoked certs
https://twit.tv/posts/transcripts/security-now-989-transcript
uber_poutine@reddit
Fyi, this is a thing, it just hasn't really taken off yet: https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities
bh0@reddit
I'm all for automating it. It's annoying to renew and update them. The problem is hardware vendors, closed source stuff, etc... I'm on the networking side of things and it's very hit or miss so far about support for custom ACME servers, or even a way to script updating certs on devices. It can and does take vendors years to get feature requests into code and that code stable enough to run in production. That's where we're at right now. I've already told people to expect lots of insecure website warnings because we simply won't spend the time to update certs on internal stuff every month until they have a way to automate things.
davidhk21010@reddit
In case you didn't see the other comment, DNS-PERSIST-01 is being implemented right now. This will make automation of certificate renewal much easier.
We should see software releases of this by the end of Q2, 2026.
Xibby@reddit
I’ve got everything automated, yes Certbot can renew with any CA that supports ACME. DigiCert and GoDaddy both support ACME, and many others.
For pain in the arse internal stuff you can setup an internal CA, but if it has a command line interface Claude Code or your AI of choice can whip up a script in no time. I have a VM setup doing ACME certs with a number of scripts for devices that can’t run ACME natively.
dostevsky@reddit
Gives ya time to counter the Omer! Ha! 49 days is an interesting coincidence right after Passover.
spin81@reddit
The tech isn't the issue. From a tech standpoint, the certificates could be 3 days or 10,000 days.
They're doing this for two reasons: the least important one is that it incentivizes automation, but the most important one is that if your certificate gets compromised, it will only be compromised for 47 days at most.
The person who told you there is a technological limitation that makes so they have to be 47 days doesn't know what they're talking about. I wouldn't believe a word that comes out of the person's mouth that said that.
And yet you're acting like you've got some kind of problem.
Yes. It's called ACME if you want to Google the underlying principles or to find alternatives to Certbot, because Certbot is just an ACME client which they made it so it's extremely easy to use with Let's Encrypt.
If your CA supports EAB, your server doesn't have to be reachable from the internet and you don't have to fiddle with DNS automation. I'll leave the actual research to you, but in a nutshell EAB means you get (basically - not quite but basically) a username and password and a server to talk to, and it's all web requests going out.
It does look like that. I agree that this is confusing. There are other ACME clients too, just google "ACME clients" and you'll find a whole bunch.
SortaIT@reddit
I would like to retire and I'm nowhere near retiring age :P
There are certificate lifecycle management tools already available that can handle this for you and make things way easier. Sectigo, Apviewx, Venafi to name a few.
Shot-Bag-9219@reddit
Infisical is open source too: infisical.com
mb194dc@reddit
Yes it's completely moronic, like most other technical stuff in this era...
tidderwork@reddit
Yes, easily.
https://eff-certbot.readthedocs.io/en/stable/using.html#changing-the-acme-server
Our private Sectigo ACME endpoint is also configured to basically never say no if you pass the keys with the request, so you don't need to do any DNS or http challenge response. Easy peasy.
space_wanderer01@reddit
We switched to Venafi (now CyberArk Cert Manager SaaS)
Shot-Bag-9219@reddit
Also infisical.com works well:
shitlord_god@reddit
ACME
attathomeguy@reddit
What are you talking about? Technology is ALWAYS changing that’s exactly what this 49-day push is. We’re moving from a world where we treat servers like 'pets' (manual care) to 'cattle' (automated replacement). If the current tech feels inadequate because it requires automation, it’s usually a sign that the legacy hardware or workflow is what actually needs to be retired, not the admin. You can’t fight the tide on this one; the browsers have already decided
spin81@reddit
It's actually 47 lol
Tx_Drewdad@reddit
"OK, I'll just die then" is totally relatable.
romu006@reddit
To answer your question, yes it's totally possible to use cert it with other providers. You have to specify what is called an external account binding. It is basically a server url + account ID + shared secret
Luscypher@reddit
Here in Argentina, the cost for our different wildcard domains, is U$D 15K.- /year suscription fee for automate SSL cert deployment, in +300 VM, SW, Forti, etc
That is the real business!!!
farva_06@reddit
I'm ready for automation, but nobody else is. I've spoken to multiple vendors that are baffled every time I tell them that I have to renew the cert every 90 days.
"Most of our clients just purchase a year long cert."
"Not for long, bitch!"
Trick_Algae5810@reddit
I thought months ago you couldn’t get certs that lasted longer, but I realized not too long ago that Amazon generated a year-long certificate for my site.
You can auto-renew certs with cert bot, yes, and it’s essentially fully automatic, assuming the CA supports ACME, which nearly everyone does.
But be careful with a server like caddy… it will request one by default when you start the server for a domain. You should also set your DNS CAA records so only a single or select few CA’s can issue certs for your domain(s)
hardingd@reddit
I think it’s the 10 day domain validation thing that is just bonkers. Basically, I think these tech companies like Digicert and Sectigo just lobby so that this has to happen. And who are you going to go to to automate the certs and domain validation?? Why, it’s Digicert and Sectigo, of course.
SortaIT@reddit
This is not exactly true. It is the root stores (Apple, Google, Mozilla etc) that want these changes and will implement and they put the onus on CAs like Sectigo and Digicert to solve this for the public.
danekan@reddit
Yes, lots of CAs support certbot / acme. What research have you done? It seems like this post would’ve taken longer than googling that info or even talking to a vendor who does this for more than just a hobby
HJForsythe@reddit (OP)
I love how you key in on one part of the discussion that is almost entirely irrelevant and then insult me at the same time. Eat it dude.
danekan@reddit
How is this t not relevant when you literally asked ?
durkzilla@reddit
"I would rather retire than purchase something to fix a major problem I have".
There are a boatload of products that can automate your certs. Even F5s, Kemp load balancers, Java Key Stores, etc. If you don't want to do it yourself, there are many solutions available.
retornam@reddit
Certificate renewal can be automated. If certificate vendors don’t provide tools for this, you can write your own code to automate the process.
clbw@reddit
You can automate cert renewals many ways using cert issuer agent if they have one,I have not seen one that does not have the option of using acme or an API script. Where I work the certs we automated are renewed every 30 days. I fully believe cert renewal will become a 1 day renewal at some point.
puffybaba@reddit
Yes, certbot can automatically renew certificates from other CAs than letsencrypt -- to do so, the other CA, such as godaddy, has to support acme protocol. As it happens, godaddy specifically is supported, as you can see here: https://eff-certbot.readthedocs.io/en/stable/using.html#getting-certificates-and-choosing-plugins which links to this:
https://github.com/miigotu/certbot-dns-godaddy
cdoublejj@reddit
it's NOT the craziest thing, there is farm ore corruption and greed going on BUT, IT DO BE WILD!!!
Random--Cookie@reddit
I just browse the internet and scroll social media feeds and don't understand. Why is this a problem?
bv728@reddit
Imagine if every key and lock you own stopped working after 49 days and you had to get new ones. They're officially free, and there's some tools that will help you replace them, but you still had to manually fix problems with the tools.
Obviously heavily simplified, but every webpage uses keys and locks for basic secure service, to prevent someone from intercepting and changing the page or stealing your data. Originally these keys and locks were supposed to last for very long times, then yearly, now they're pushing monthly.
HJForsythe@reddit (OP)
Its not a problem for you because you don't manage certificates on servers. It could be a problem for you if not enough people that do manage certificates on servers aren't ready when this change happens.
lazyhustlermusic@reddit
These are just folks that are accustomed to using letsencrypt
HJForsythe@reddit (OP)
Yes we've never used letsencrypt ever.
lazyhustlermusic@reddit
Interesting sarcasm when I agree with your sentiment.
HJForsythe@reddit (OP)
That wasn't sarcasm.
lazyhustlermusic@reddit
It’d be nice if they actually pulled revocation stats, I’ve never seen one compromised, plenty of places even struggle with the year cadence of manual replacement especially when you have 2-8 companies in the chain all using each others services, some of them pinning to specific certs, it just becomes a gigantic cluster F
HJForsythe@reddit (OP)
The bigger problem is always going to be users bypassing the certificate warnings anyway. This is all highly pointless.
lazyhustlermusic@reddit
Bypassing what warnings? Any browser warning on a service generally breaks daemon communications and would be a p1 outage call
HJForsythe@reddit (OP)
You know when you hear of a BGP hijack of an IPv4 route and people get their crypto stolen? That can only occur because people in their browsers accept invalid SSL certificates as being legitimate and they ignore the warnings which are meant to prevent MITM attacks.
lazyhustlermusic@reddit
It’s kinda clear that you’ve never worked on api or automated infrastructure.
HJForsythe@reddit (OP)
Sure sure we've just been provisioning fully automated infrastructure for customers since 2009. Being able to automate something that is just a broke technology doesn't make you cool or edgy.
lazyhustlermusic@reddit
You seem to have a bias against a very specific corner case. Best of luck.
HJForsythe@reddit (OP)
Yes, you told me I've never used an API before. lol
lazyhustlermusic@reddit
Used != designed or supported from an infrastructure perspective, which was the entire point.
lol indeed
HJForsythe@reddit (OP)
What in the actual fuck does what you're saying have to do with anything?
lazyhustlermusic@reddit
Clearly that you have no idea what you’re complaining about, but you’ve made that very apparent yourself.
But sure the only world that exists for certificates are herp derp users ignoring browser warnings.
HJForsythe@reddit (OP)
I guess what you are saying is that you've allowed the private key for your APIs that you run to be stolen at least enough times for this to be an issue for you?
lazyhustlermusic@reddit
lol someone doesn’t understand PKI
HJForsythe@reddit (OP)
Cool I'm glad you commented.
lazyhustlermusic@reddit
Kind of oddly hostile still, must be the dunning Kruger still kicking in. Juniors always form hard opinions about things they don’t really understand.
Don’t worry, you’ll make it eventually. Maybe.
HJForsythe@reddit (OP)
bye felicia
ConfusionOk4129@reddit
Don't worry a new SaaS platform will help you for 1999.99 a month.
insufficient_funds@reddit
I don't understand what the point of the shorter and shorter lifespans is... :(
HJForsythe@reddit (OP)
Its because the revocation mechanisms in the certificates are unworkable and instead of fixing that problem they're simply creating bad solutions.
insufficient_funds@reddit
ah sounds like typical management ignoring engineers then.
hardcorepr4wn@reddit
We’re doing this with digicert atm. Using an ACME client (not certbot, can’t remember which), and it’s going alright. We refresh at 30d, 19d for handling issues.
ancientstephanie@reddit
CA/Browser forum, which is composed of the major browser vendors and the widely recognized CAs, got together and decided that an adequate technology solution for certificate revocation not only doesn't exist, but fundamentally can't coexist with the necessary privacy, availability, and reliability guarantees. Everything to date, even Mozilla's CRLite, which came about after this was in motion, is a stopgap.
That was the main factor in this - certificate revocation sucks for everyone involved, and both CAs and Browsers want to be done with it. OCSP has to phone home. CRLs get too big. And and failed dissemination of revocation information, whether through OCSP, traditional CRLs, Chrome CRLsets, or Mozilla CRlite, is a soft fail.
The other big factor here ... is 100% about being able to change the technology itself, and about being able to kill off some of those legacy systems, at 49 day speeds. When we eventually have another major algorithm or protocol vulnerability discovered, or some breakthrough in quantum computing threatens multiple algorithms at once, the shorter renewal cycle can be used to rapidly sunset the vulnerable algorithms or protocol.
SirLoremIpsum@reddit
I think that's overly dramatic.
Automate it. If it cant be automated replace it / upgrade it.
If you have an up to date tech stack and implement it properly you will have zero issues and be in a better place operationally and security wise.
What's to hate?
If you automate it it is not an issue at all.
HJForsythe@reddit (OP)
Do you not understand that shortening the lifespan of the certificate doesn't correct the problem?
Connir@reddit
I was asked when I was 18 what I wanted to go to college for, I said "computers I guess..."
I should've gone into accounting....
HJForsythe@reddit (OP)
Yeah when I was a teenager I knew this is all I wanted to do and now I regret it every day.
dont_remember_eatin@reddit
At some point in the past, before my time, the genius decision was made to use letsencrypt certs in our airgapped network instead of just having a local CA.
I think this is the impetus we've needed to change that. Because less than two months is horseshit.
TryTurningItOffAgain@reddit
How do y'all manage your certs? Do you guys use a cert manager if you handle a lot? If so, do you just use your cert provider's cert manager or a 3rd party?
HJForsythe@reddit (OP)
We have like 30 external certs total that are used by something like 17 different "technologies", some are basic apache, others are IIS, others are exchange, others are appliances/loadbalancers, others are cloud services, etc.
When they expired annually we simply just replaced them anytime they were coming up for expiration because it isn't a giant deal to do that once a year honestly. It takes like 4 seconds per cert.
Now that it's shortening which doesn't actually solve the underlying issue with the certs so it's pointless anyway we are trying to wrangle all of them into certbot or whatever but it's still not going to fix the problems that SSL certificates don't actually work as it stands right now.
flunky_the_majestic@reddit
“Rather just retire” is a little extreme. But yeah, it’s annoying and pointless.
ledow@reddit
In convenience, maybe.
In security, no.
Almost like there's a trade-off that is universally applicable there, eh?
Kraeftluder@reddit
The only thing this solves is that browsers are too dumb to implement standards properly. There was no problem in the wild with longer duration certificates. "They could be expired" is something that even goes for a 1 day valid certificate that was minted an hour ago.
This secures nothing and helps no one.
ledow@reddit
Securing nothing is not the same as "two steps back" - that would imply this is LESS secure. We could discuss whether it's MORE secure, but that's not the argument.
It's NO LESS secure than it ever was, so it's not a step back in terms of security.
Convenience, maybe, but not security.
Kraeftluder@reddit
Who's talking about securing nothing?
What reply did you read?
Let me reformulate; This makes nothing MORE secure than it already was.
ledow@reddit
"This secures nothing". Literally in the post I replied to.
What reply did YOU read?
Kraeftluder@reddit
Do you understand language? "This" refers to "this measure" as we were discussing it holy shitballs.
TheFluffiestRedditor@reddit
I'm starting to feel like the whole CA system is flawed. Far too few people understand how PKI works (it is complex), and everything is now dependent on it being configured correctly, and operating properly. Rotating certificates like this is just layering band aids on top of each other.
radicldreamer@reddit
Ugh, cryptonerds.
https://xkcd.com/538/
Antique_Grapefruit_5@reddit
Agreed. This is absolutely stupid. Fix the technology first...
Civil_Inspection579@reddit
Yeah, it’s frustrating but the shorter expiry is about reducing risk if a cert is compromised. Automation (like Certbot + ACME) is basically the industry’s answer now, whether we like it or not.
Fallingdamage@reddit
I automate my cert renewals, so I dont notice other than my renewal reports come to my inbox more frequently.
idealistdoit@reddit
I've been angry on this topic since it was announced. The working group would rather give the entire world an ultimatum, "automate or the internet will break", than fix the certificate revocation problem with a real technical solution. They chose the lazy way. Now everyone /else/ has to work to fix it. That's not a solution in my mind and so they get my ire.
I'm ready to automate. But I still resent them for being lazy and forcing everyone else to solve it for them.
BigLeSigh@reddit
These days.. I’d take anything that keeps you employed tbh
Once AI figures out a replacement option it will happen. Humans are too dumb to solve the problem that exists. It all boils down to how can you create trust when no one trusts anyone
TryTurningItOffAgain@reddit
I have to do this eventually too. Are we essentially installing "agents" to renew certs on every machine?
smartguy_x@reddit
Totally get the frustration. Even if you automate renewals, 45 to 49 day certs create a real visibility problem, especially across internal servers and mixed environments.
That is why tools that focus on expiry tracking still matter. If you already have AppViewX, something like Tokentimer (tokentimer.ch) could still be useful as a lightweight way to keep cert, token, and secret expirations visible in one place without adding more PKI overhead.
Able-Ambassador-921@reddit
What problem is this solving?
kombiwombi@reddit
The basic problem is that revoking a compromised certificate has always been a bolted-on hack, and now even that is not fit for purpose.
So this time they are dropping the certificate lifetime to what the group issuing certificates thinks is a reasonable cap to the time a compromised certificate can be exploited.
Of course, it's not reasonable at all. But it is cheaper than building a scalable revocation infrastructure, so the certificate issuers are all for it.
Able-Ambassador-921@reddit
I c. Thank you for explaining. Seems like such a waste of resources for something that should be automated within the security process itself.
Can't a public DNS type solution be used for this ?
CruwL@reddit
poor certificate revocation practices.
skiitifyoucan@reddit
we do have about 2000 public certs. its 100 of them that take up 90% of my time spent dealing with certs (a small fraction of my job...) . not everything is cookie cutter. we have big brand name partners as well as companies nobody ever heard of who refuse to let us issue the certs ourselves via domain validation. Some of them actually have CAA records preventing it... Which I've seen exactly once in 20 years of dealing with thousands of companies. The process becomes this convoluted back and forth via email where I sent them a CSR, they don't like how it looks, we go back and forth , eventually I get a cert and semi-automatically semi-manually install it. Now multiply that by 100 and it becomes a bit of a pain........now take that down to 47 days expiration, it should be very interesting :)
HJForsythe@reddit (OP)
I have exactly 35 SSL certificates. I cannot imagine your situation.
FourEyesAndThighs@reddit
We’ve been able to automate a lot but still have two holdouts that are going to be a problem - SAP and an internally-hosted FTP. We have been asking both for a year what their plan is and neither one of them have an answer yet.
Unable-Entrance3110@reddit
Yeah. I get it, automation is the way to go. I certainly automate it in my environment whenever possible.
What really irritates me is the clear motivation by big players to use security as a bludgeon to force people into subscriptions. I see this as the primary motivation behind these certificate lifetime changes.
It's the embrace, extend, extinguish play.
First you ratchet down the lifetime (in the name of security! Nevermind that the problem of revocation has already been solved).
Second, once everyone is dependent on automation, you extend the paid services with features that the free tiers can't.
Finally, you undermine or eliminate the free services (LE is primarily funded by the big tech companies)
I know, I am a paranoid old person. But I see the pattern by now.
Don't get me started on the whole "you don't trust me to keep my private keys safe" bull crap.
Adda717@reddit
My team is currently in the process of building out Keyfactor into our environment.
aon9492@reddit
Dreading it.
If anyone has had any success managing things this way for ADFS STS domains please hit me up.
dts-five@reddit
1) Corporate IT emails me, "Is server x still in use? I reply, yes.
2) They renew the SSL with InCommon and send me the links.
3) I'm lost when I read these threads on automating the process.
I have no idea how these changes will work with our current workflow. It doesn't feel sustainable.
HJForsythe@reddit (OP)
Apparently you're supposed to just use letsencrypt and never use anything else if the comments in this post are to be believed.
CatoDomine@reddit
Certbot is a standard ACME client.
All public CAs support ACME.
Additionally, some CAs have other automation integrations through network agents.
Internal appliances and other hosts that cannot be easily automated often do not need a public CA trusted cert. You can distribute a private CA trusted root to your internal hosts and issue certs from your private CA that exceed whatever limits are imposed by the CA/B on public certs.
If you do not wish to administer your own PKI some Public CAs will be happy to host your Private CA so that you can leverage their existing PKI to manage private certs. Including automated issuance of private certs using their tools like ACME and network agents.
You should take the opportunity to run as fast as you can away from GoDaddy and get a better CA to handle your certs.
anortef@reddit
Are we discussing automated cert renewal in 2026? really?
HJForsythe@reddit (OP)
Are we missing the point entirely in 2026? Really?
anortef@reddit
To me it sounds like sheer stubbornness at this point. Current cert management is not perfect but we are where we are and there is no realistic alternative and if you decided to stick to Reagan era systems its on you.
HJForsythe@reddit (OP)
lol alright thanks for your input from the edge of technology.
flaccidplumbus@reddit
Of automated cert renewal?
HJForsythe@reddit (OP)
The point more so was that if the underlying technology cannot be relied upon it should be scrapped rather than just shortening the lifespan of a certificate.
tuskenrader@reddit
Yeah I'm most worried about hybrid Exchange. Replacing certs is a PITA, there's always some issues. Also, you always have to run the GUI based hybrid Exchange wizard when/after updating certs. How do you automate that wizard? I don't know if it's even possible.
HJForsythe@reddit (OP)
Some guy here was saying earlier that he just uses HAPROXY infront of his client connectors and never updates the actual SSL certificates on his exchange server anymore. If that sounds like a solution to you then there is that option I guess. Sounds like an actual op nightmare to me but you know. I'm apparently the asshole for asking questions.
NappyDougOut@reddit
Complexity is added to tech to raise profits in the food chain...
Honestly, web hosting is getting more complex and expensive because large companies don't want anyone but themselves to run sites & apps, so they can control & own everything like monopolies.
That's why they're lobbying so hard to create rules that don't make sense, raise complexity & skyrocket costs. They often negotiate behind the scenes with lawmakers & each other to push their agendas.
Also why they're working to undermine & overprice self hosting and even related software & hardware for doing it more & more each year. 😐
shellmachine@reddit
Looks like whatever CA you use breaks your automation.
frymaster@reddit
certbot implements a protocol called ACME - it was developed by the letsencrypt folk but most - all? - of the cert providers support it
KillerKellerjr@reddit
You are suppose to automate the process of renewal. You're making this out to be a bigger deal than you need to. Any guide you follow will walk you though automating the renewal process via a cron job. It's nice never having to worry about the semi-manual process of renewing a cert. Even Chat GPT will walk you through the process on whatever OS you are using. I used it on all of our internal servers and have never looked back.
alyssa_at_chronicle@reddit
u/HJForsythe
markth_wi@reddit
Absolutely, but there are a few problems here.
Firstly , it's moments like this when you realize Sneakers isn't just some old film, it's required watching, it's not like we hadn't seen this coming.
More plainly
We haven't automated this , which is a fair criticism, I roll hard on the Eisenhower principle so this is one of those 5 minutes once every year so it stays unautomated, if :I'm doing it every 60 days or every week than I'm going to automate.
Key vulnerability - the other less spoken of concern we've gotten a bit comfortable so it's incumbent we keep ourselves in play technologically, or other nations will absolutely be happy to take up being secure while we wonder why things go sideways. So we adopt methods of PQC whether it is settled to some sort of lattice math or some combination of high bit Elliptic Curve 25519 type standards no doubt these too will become vulnerable over time.
Even with these later developments, while these systems appear to be the most resistant to the sort of very easy decryption efforts we must expect to see as quantum cryptographic chips and/or GPU like devices become more prevalent making decryption near real time.
There is also the question of the use of LLM's lean into this trouble as well, because of the fact that we're at or near the cutting edge , in the next six months to 2 years the commercial/practical edge is going to end up being just a couple of years away from the publicly available edge of known mathematics.
One of the most powerful features of LLM's is the ability to explore the sometimes seemingly impractical gaps between discovery/innovation A and discovery/innovation B, so the "gap" isn't just one of distance from where we are practicing engineering commercially and the cutting edge of applied mathematics , it's the semi-automated, perhaps even completely automated low-rent research that might stumble into a Riemann loophole and close the gap between "hard to break" and "trivial to break".
To my mind and to OP's point, this provides a claustrophillia we must become comfortable with. This absolutely wants to make me want to retire, but I also understand this is as much my fight as someone else's, there's an uncomfortable moment when you're doing this job when you look around and realize "you're it" , you're the person everyone else is depending on.
People like to say it's a privledge but the fact is, it's a responsibility.
Of course our media champions every ego that prances around pronouncing themselves that "smartest guy in the room" , almost certainly that's not the guy you need to worry about, and it's a call on everyone else to get serious , carve out time and put some of that much lauded grey-matter to work. Of course German linguistics has a word for this, sitzfleisch , sit your ass down and do the job.
It seems it's a question of how do we like our civilization served up, with all the conveniences of interconnected , remote trade or do we find ourselves in some reduced circumstance, or we have some sort of cryptographic Pearl Harbor, 9/11 type day when we find out shits been compromised all around for a while and we spend ruinous amounts of time-money and effort scrambling back to square one.
And it won't be that cool, it will simply be some "and treasury bills in 14 nation-states went belly up for XYZ reasons...." , who needs that headache.
oldmilwaukie@reddit
It’s increased my job security by several years so I’ll take it.
Metalfreak82@reddit
I feel the same. I have automated most of it now, but there are still some systems that don't support that or I don't have the permission to do this.
And I've already seen the automation fail, and with the next attempt it works. It's not that that gives me much confidence in this whole expiration date thing.
HumanInTerror@reddit
Put all the "stuff you can't automate" behind a reverse proxy and let it handle public cert renewal for you.
rose_gold_glitter@reddit
Should be fun on a remoteapp server. Updating SSL on those is painful at the beat of times.
lowlybananas@reddit
I spent a few weeks automating every cert in our company. About 110 of them. It's not terribly difficult. And the great thing is I'll never have to manually renew any of them again.
LVorenus2020@reddit
Is it really down to that? Ridiculous. From multiple years to... A year limit was already pushing it. Just ridiculous.
idontknowlikeapuma@reddit
Oh no! Set up a cronjob? Woe is me.
That will take 15 hours of downtime and I have to deal with all those upset users./s
Tarcanus@reddit
I've just been fighting with my available time versus 3rd party products.
I don't have the time to whip up a system with open-source solutions, so I need to rely on the company's purse, but now it's finding time to configure the vendor product.
I've basically thrown up my hands to my supervisor, telling them I don't have the time to dig in and do it right, so I'll use whatever product you want me to as long as a decision is made before 2027.
The certs are already down to 200 days, and down to 100 in March 2027. It's starting to freak me out the longer decisions aren't made.
dmigowski@reddit
It's to be able to sell you certs more often. Not because of the security.
cantstandmyownfeed@reddit
When you buy a certificate, you buy it for a term of however long. A 1 year term, includes as many reissues/rekeys as you want. There is no increased cost.
Le_Vagabond@reddit
oh the horror, the $0 certs we automate are going to cost us $0 more often.
dmigowski@reddit
Yes, because let's encrypt, but there are still many companies with other cert configurations.
bendem@reddit
I mean, sure it can be automated, but if renewal breaks for a 3 month certificate, I have a month to figure it out. If it breaks for a 49d cert, I have 16d. Fuck long holidays now.
Zolty@reddit
However you do research, that’s what you want to improve.
Akeshi@reddit
I'm not sure it ranks in the top 1000. Sorry if you're finding it difficult.
1_________________11@reddit
Quantum baby
whopooted2toot@reddit
We have had better luck as of late doing SSL Offloading on our perimeter device (Mix of F5 APMs and Barracuda LBs) Then doing internal re-encrypt using our CA / PKI. Only one of our WAN facing apps has to have the cert baked in (Omnissa Horizon). I take it we are fortunate.
midasweb@reddit
Nothing like turning SSL certificates into a bi-monthly panic ritual to make sysadmins question their life choices.
nullbyte420@reddit
makes them question if they have any clue how to do their job. automation is easy.
ZealousidealTurn2211@reddit
On that note, certificates really aren't that complicated to manage. They're just "scary" to some people. People afraid of managing them are going to be just as afraid of figuring out automating them.
nullbyte420@reddit
yeah. imo the only scary part of managing certs is doing it manually.
hammertime2009@reddit
The more we automate the more I feel like our jobs are going away.
nullbyte420@reddit
where i work, automating stuff is my job. it's not going away, it's most of what i do. don't want to rotate certs manually..
xzer@reddit
https://www.reddit.com/r/sysadmin/comments/1sgnnra/comment/of6ahgw/?utm_source=share&utm_medium=mweb3x&utm_name=mweb3xcss&utm_term=1&utm_content=share_button
IN-DI-SKU-TA-BELT@reddit
Good smoke test to see how capable your team is.
ledow@reddit
Or to make them think "Why am I even doing this manually in the first place?"
It's literally only because it was "only once a year" that people never took the time to automate it.
User1539@reddit
Yeah, there's some kind of weirdness with snap installs of docker not seeing symlinks quite right, so I have to manually do a little dance to get some of my reverse proxies to see the new certs.
Obviously, I can either just re-build the server, or write a separate script.
But, meh ... is this really fixing anything?
Z3r0C0o@reddit
This is to force the government into cloud automation services, I'm willing to bet on it
gex80@reddit
Honestly, it's not that big of a deal and anyone one forward thinking would've seen this coming. This is where movies and reality start aligning more. Frequent rotation in movies was one of the things that made "hacking" hard.
We are eventually going to get to a point where it's going to be closer to PKI for websites.
Ramorous@reddit
ACME, EST... Many options available.
We subscribed to AppViewX to perform certificate lifecycle management. Using their PKI now and have internal servers using it for named host certificates expiring/renewing every 45 days.
As certs expire, we're moving away from wildcard to individual using the same solution.
jhulbe@reddit
ACME baby
OddAttention9557@reddit
I'm quite glad it's prompted me to reappraise the LetsEncrypt ecosystem and clients. Automating was easer than I expected, even for systems I thought would be difficult (For example Windows Essentials servers where the same certificate is used by IIS, RRAS and RDG, and port 443 is multiplexed via http.sys), and will ultimately save my clients money vs manual renewals every year.
It's quite possible that what you expect to be pain points here really won't be so challenging, particularly if you can get Claude to help you with any unfamiliar parts.
MrSanford@reddit
If you can't think of a solution for this you should retire IMO.
billy_teats@reddit
Why have a scheduled task when you can just set an alarm on your phone to complete the task manually?
yankdevil@reddit
I automated cert renewal back in 2016. I literally give it no thought. The idea that anyone is manually renewing certs in 2026 is hilarious.
zerosanity@reddit
Some third party providers stupidly require you to interface with their website manually to update the cert, even worse, some require to email their support staff to update the cert Ups specifically has now allowed self signed certs for some of their services
slayermcb@reddit
My annual cert renewal day is a black spot on my calendar. Its not difficult, just annoying. Mostly because I work in the Mac world and also need to do an apple cert and load it all up into an MDM at the same time.
rybl@reddit
Hopefully it will force vendors to all support ACME certificates, but it's going to be a rough transition until they do.
dnuohxof-2@reddit
49 days is putting a bandaid on the problem instead of actually making things more secure by default.
lsumoose@reddit
We started automating everything years ago mostly to save on cost but now it’s just the cherry on top.
mikeputerbaugh@reddit
You're supposed to replace the tires on your car when the risk of continuing to use the same ones hits a certain threshold, well before they stop working altogether.
It is the same with certificates.
Man-e-questions@reddit
The ironic thing is its getting harder and harder to brute force a modern certificate. Its like a bank having a safe that takes 10 years to crack but they throw it away and buy a new one every month.
hammertime2009@reddit
I don’t think it’s just because of brute forcing certs. It’s if they become stolen by other means such as vulnerabilities.
Man-e-questions@reddit
Doesn’t really make sense though. If they don’t have the private key, they can “steal” the certificate and put it on their own server. Lets assume they can spoof DNS or whatever to send your traffic to their servers. Your browser STILL won’t trust the cert since the private key isn’t installed.
_mick_s@reddit
'just change it's... Why do you think it didn't go straight to 49 days but to 1 year, 200 days, 100 days first?
Even this change was too much to do outright.
I for one am glad this is happening, makes it harder for shitty providers to avoid having easily automated workflows.
krattalak@reddit
I mean, I finally have a reason to really use Ansible now. Or something that does automation. It looks good on a resume.
HJForsythe@reddit (OP)
We automated a lot of our operations using straight up PHP scripts that SSH into shit in like 2009. The point of this post isn't that I don't know how to automate processes. The point is that you're automating something that is already broken.
trisanachandler@reddit
If I were still working at an MSP, dealing with legacy SBS's, on prem exchange servers, citrix servers, and windows, I'd agree. Since I'm mostly on cloud now, no issue.
Vistaer@reddit
It makes me feel blessed to have a PKI team who lives this life, and makes me willing to raise my hand if they need help with deploying, monitoring, or managing their solution’s platform.
bardolph77@reddit
That's some production breaking level stupidity, who has processes to renew certs every 30 days so you have a time buffer if something goes wrong. And the freaking costs of this big brain idea!!?!
ArieHein@reddit
Becauae a powershell script that swaps certificates is hard?
Secret_Account07@reddit
We automate most things but there is one system we can’t for reasons I can’t get into. OPs complaint is valid, remove the cert part and just apply generally.
This cert idea makes sense but I’ve seen dumb thing become a standard because some group of folks made decision xyz and the industry just throws up their hands and say - it is what it is
Now granted for certs we can generally do whatever internally but I get the general point. Most the time these security decisions are made there is a good reason, but I’ve worked with enough SecOps folks to know that’s not always the case
Sudden_Office8710@reddit
It’s not any random group of folks it’s Apple. And Apple is doing it to ensure we are all Post Quantum Crypto compliant. It’s actually 47 days to give you a 17 day window to replace a certificate every 30 days. Computing power is growing more and more powerful and eventually if you’re not PCQ you will be vulnerable. So say thank you to Apple for forcing this on us for our own good.
WolfetoneRebel@reddit
Yup
billy_tables@reddit
I'm on board with it in so far as it gets me completely off the hook for explaining how I handle revocation. At shorter lifecycles auditors are happy revocation is irrelevant, which means I get to believe that too!
wintermute023@reddit
I must say it did make that section a lot quicker in our ISO audit.
Shibizsjah@reddit
You have to automate. 2030 will break your back if not
jason9045@reddit
We've got a couple of systems that can't be automated for one reason or another and I'm the cert guy here so it's going to be my problem in about a year when our current batch expires. I'm absolutely thinking about walking away from here before then like Angela Bassett in Waiting to Exhale
v00d00ley@reddit
https://bugzilla.mozilla.org/show_bug.cgi?id=647959 oldie but goldie, about how to join the trusted root certificate authority cartel
Seems that CRL and OCSP are not capable of handling the revocation process, so the only solution to be sure that your certificate is not compromised is to cut the lifetime of the tls certificate.
Ikinoki@reddit
At this point it will be more secure to run this on blockchain.
TuxAndrew@reddit
Nope, we automated most of our certificate renewals. If you don't think it needs to have an external certificate then host your own CA for those services/legacy hardware.
olcrazypete@reddit
Spent as week recently setting up automation on internal proxies and fortinet load balancers. The forrinets actually have some acme stuff built in but ended up doing a bit of script and push that uses some restapi and some paramiko ssh stuff.
FatherOblivion63@reddit
I retire next week. 49 day expiration due to years of poor security and sh!t revocation policies is just a reminder of how IT has gone to hell due to 'great ideas'. We have a vendor controlled GIS/OMS system and they can't manually replace a cert in less than a day to save their lives.
Live-Juggernaut-221@reddit
If you're not automating cert renewals you're ngmi
Fit_Prize_3245@reddit
It's not as bad as it sounds. You can set up a cron to run certbot renew and reload your web server config every day 1. As long as your software is configured to use the live certificates from certbot, it should just work with no problem.
actionfactor12@reddit
I'd love to retire, but not specifically because fo this
ledow@reddit
You mean you didn't just deploy LetsEncrypt YEARS ago when the opportunity came along to have perfectly-acceptable SSL certificates for free by doing almost nothing?
No, that's really not cause for me to "just retire".
I walked into my last workplace, deployed LetsEncrypt, saved about £200-300 a year (a tiny, tiny drip in the ocean of other IT expenses) and haven't thought about it since in the 3 years hence.
When that 49-day thing comes in? Oh no. I'll have to... do nothing at all, whatsoever. The certs I get from LE will just be shorter length, and every day the ACME renewal tools will continue to check if any are near expiry and automatically renew them for me.
Same for my personal stuff (and, for reference, I rent a dedicated server in a datacentre, and that runs a dozen websites, reverse-proxies all my internal home stuff so I can access it remotely and, yes, it's all LetsEncrypt and has been for... I want to say at least 10 years?)
hippohoney@reddit
it sounds insane at first but the push is really toward automation. shorter lifetimes force better practices even if it feels painful operationally
blueblocker2000@reddit
I don't believe its going to have a meaningful impact on security. I do think it'll be "Just one more thing".
FloridaIsTooDamnHot@reddit
Given the preponderance of accessible automations for this, it is a choice that you and or your employer are making.
Human-Company3685@reddit
You’re not alone feeling that way.
SandeeBelarus@reddit
I get what your saying. The world has shifted from when you may have started. Authentication currency like digital certs and other crypto just needs to be short lived Wait till you see what DV certs has down the road.
Burgergold@reddit
Automate or let that responsibility to someone that has lower skills
jdiscount@reddit
Why is it so crazy, it's easily automated
mangeek@reddit
I'll admit that i have one or two systems that I still manually install certs for (need to find time to automate them), but it's been standard practice to automate certificate installation for a LONG time. There's almost no scenario where you can't use a tool or script to let your devices/servers just get their own fresh certs monthly.
Satoshiman256@reddit
It's 47 days.
sionescu@reddit
It's definitely time for you to retire.
uniqueusername42O@reddit
Terrible attitude.
MekanicalPirate@reddit
Yes, i don't get it either