• Onno (VK6FLAB)English
    arrow-up
    21
    arrow-down
    4
    ·
    3 hours ago
    link
    fedilink

    I’m sorry, but has no-one heard of https://letsencrypt.org that issues certificates via API for free?

    I would not be surprised if certificates at some point will be issued for each session.

  • exuEnglish
    arrow-up
    12
    arrow-down
    2
    ·
    2 hours ago
    link
    fedilink

    Good, certificates should be automated anyways. Much more reliable than the once yearly outages because nobody renewed the thing or forgot some systems.

    • 0x0English
      arrow-up
      3
      arrow-down
      1
      ·
      2 hours ago
      link
      fedilink

      Good, certificates should be automated anyways.

      The problem being when that can’t be easily automated? Did you read the article?

      • exuEnglish
        arrow-up
        4
        arrow-down
        1
        ·
        2 hours ago
        link
        fedilink

        Good incentive for the provider to fix it or go out of business.

      • JustinEnglish
        arrow-up
        4
        arrow-down
        1
        ·
        2 hours ago
        link
        fedilink

        They should be automated too.

        The fact that I can’t use terraform to automatically deploy certs to network appliances is a problem.

        • hemkoEnglish
          arrow-up
          2
          arrow-down
          0
          ·
          1 hour ago
          link
          fedilink

          Technically, you shouldn’t even deploy certs to network appliances or servers but they should fetch certificates automatically from a vault. I know there’s minimal support for such things right now, but that should be fixed by vendors.

          Even Microsoft supports such solutions in Azure both with PaaS components and Windows and Linux servers (in Azure or onprem) via extensions

  • katy ✨English
    arrow-up
    2
    arrow-down
    0
    ·
    13 mins ago
    link
    fedilink

    spending $300 every 90 days instead of 365 days is so much better /s

    i hate apple so much

  • fartsparklesEnglish
    arrow-up
    7
    arrow-down
    2
    ·
    2 hours ago
    link
    fedilink

    Smells like Apple knows something but can’t say anything. What reason would they want lifespans cut so short other than they know of an attack vector that means more than 10 days isn’t safe?

    AFAIK they’re not a CA that sells certs so this can’t be some money making scheme. And they’ll be very aware how unpopular 10 day lifespans would be to services that suck and require manual download and upload every time you renew.

    • 0x0English
      arrow-up
      3
      arrow-down
      2
      ·
      2 hours ago
      link
      fedilink

      Smells like you didn’t read the article, it’s an ongoing trend:

      Max lifespans of certs have been gradually decreasing over the years in an ongoing effort to boost internet security. Prior to 2011, they could last up to about eight years. As of 2020, it’s about 13 months.

      • li10English
        arrow-up
        5
        arrow-down
        1
        ·
        2 hours ago
        link
        fedilink

        Reducing it to one year made sense, one year down to 10 days is actually a fucking massive difference. Practically speaking, it’s a far, far bigger change than 8 years down to 1.

        This isn’t just an “ongoing trend” at this point, it would be a fundamental change to the way that certificates are managed i.e. making it impossible to handle renewals manually for any decently sized business.

  • solrizeEnglish
    arrow-up
    4
    arrow-down
    0
    ·
    3 hours ago
    link
    fedilink

    Lame. 45 days? 10 days for DCV? How common are exploits involving old certificates anyway? And automated cert management is just another exploit target. Do they seriously think an attacker who pwns a server can’t keep the automatic renewals running?

    • 0x0English
      arrow-up
      4
      arrow-down
      0
      ·
      2 hours ago
      link
      fedilink

      The solution, according to Sectigo’s Chief Compliance Officer Tim Callan, is to automate certificate management — unsurprising considering the firm sells software that does just this.