30 April 2025
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
Apple has done it again. In 2020, when CAs refused to voluntarily accept shorter certificate lifetimes, Apple forced the issue and made everyone accept lifetimes of 398 days. Because Apple is so dominant, CAs had no choice. Now, five years later, Apple has done it again and restricted certificate lifetimes to only forty-seven days. On this occasion, the decision formally happened through the CA/Browser Forum as it should have been, because there was little resistance from CAs. The conversation started in October of last year and went through several iterations. The final ballot was SC-081v3 (see the discussion and results).
We all knew this day was coming. After the initial reduction to 398 days, Google spent years saying it wanted to reduce that down to ninety days in the company’s Moving Forward, Together manifesto. That seemed like the natural next step, and so most people were surprised by Apple going further than that. If the number forty-seven seems odd to you, just think about it as monthly certificate updates with some extra time available to sort out renewal problems should they come up.
There is no reason to panic just yet: The adopted approach plans to gradually reduce maximum certificate lifetimes across several years, from the current 398 days to 200, then 100, and then finally to 47 days. The first reduction is planned for March 2026 and the last for March 2029.
In essence, the clock is now ticking for everyone to get their houses in order before it becomes untenable to replace certificates manually. ACME support is currently poor. As just one example, we at Feisty Duck recently reinstalled one of our servers that is relying on the Apache web server. Although it’s now possible to use ACME out of the box (via mod_md), there was still a steep learning curve. Most other web servers do not provide native support for ACME. Servers that make it easy are rare, with Caddy being an exception. Institutions will need to think about the following points:
In parallel, the CT ecosystem will need to be upgraded. Even today, with longer-lived certificates still allowed, many individual CT logs are struggling to cope with the load. Just this month, three logs malfunctioned and had to be shut down. Between certificate lifetimes being reduced on the one hand and Let’s Encrypt offering six-day certificates soon on the other, the ecosystem will need to improve in both robustness and redundancy quickly.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.