29 January 2026
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
High-Assurance Certificate Transparency Monitoring. This brand new whitepaper captures the current state of public PKI security, providing a step by step guide how high-profile organizations can protect their estates and reliably detect attacks without being drowned in noise.
In January 2025, Let’s Encrypt announced it would offer short-lived certificates and, this month, it did. If you’ve been following the drama about the reduction of certificate lifetimes to only forty-seven days, wondering what the fuss was about—then this will be great news for you. Now you can go as low as six days (and a few hours). In addition, for the first time ever, Let’s Encrypt is now issuing certificates for IP addresses.
Let’s unpack what’s new, why it’s happening, and what you can do with it. First, you can now use six-day certificates for your properties. If you decide to use them, it will be because you care about the potential window of opportunity for attackers who compromise your key material. The scenario here is this: Either (1) someone breaks into your servers or (2) one of your staff decides to steal the keys. Because these new certificates expire quickly, there is a very short window in which they can be exploited, compared to the previous best of ninety days. If you’re wondering why you can’t just revoke these compromised certificates, it’s because no one will notice. We wrote about the problems with certificate revocation at length last year, in response to Let’s Encrypt’s original announcement.
Clearly, not everyone is going to care enough about this. Those who do will be a potential target for someone to both steal their keys and use them in active network attacks. Think about financial institutions and very popular consumer systems, for example.
These new certificates come at a cost. If you decide to use them, you will already have automation in place, so you’ll just need to make a small configuration change. Things will continue to work. If you’re currently renewing every sixty days, these six-day certificates renew after approximately four days, so that will be a fifteenfold increase in the issuance rate. I don’t think that the increase matters a great deal as such, but the fact that you will be renewing so close to the expiration means that there will be a much slimmer margin of error. If your certificates are checked daily, then renewing thirty days before a certificate expires means you have about thirty opportunities to get a new certificate. With six-day certificates, that will probably reduce to just three opportunities. You don’t need to have people on call for this, but you will need to have people doing weekend shifts.
A few years ago, a mention of short-lived certificates would have made me worry about end user clock skew. When you’re serving a very wide audience, a lot of your customers are going to have broken clocks. This can lead to downtime even with a longer certificate, but it’s going to be worse with these very short ones. It’s not clear if this is a real problem still, because no one has complained about it in the last couple of years. But it’s something to keep in mind.
Let’s Encrypt is not the only CA to support short-lived certificates; in fact, Google Trust Services does so as well. Further, this CA will allow you to choose the exact duration in days. That made me think about what the lowest duration we can get might be—but Scott Helme beat me to it. The answer is a one-day certificate.
Remember, just because you can get one of these, it doesn’t mean you should.
This new update from Let’s Encrypt also introduced certificates for IP addresses. Although definitely a niche use case, it’s a great thing to be able to issue certificates for network devices that need security but don’t necessarily have hostnames. Actually, it’s something we will use at Feisty Duck. In our training courses, we give our students servers to work on, and we will use IP address certificates to protect the servers’ control interfaces out of the box. There are other ways in which we could achieve the same effect, but it feels natural just to protect IP address access directly.
Getting a six-day certificate should be easy with any ACME client that supports profiles. With Let’s Encrypt, you just need to switch to its “shortlived” profile. I tried this with Certbot and it worked just fine. If you’re after an IP address, the latest released version of Certbot (5.2.2) doesn’t have support yet. A new release that fixes this is expected soon. In the meantime, lego worked just fine when I tried it the other day:
# lego --accept-tos --domains 206.189.27.68 --http --disable-cn \ run --profile shortlived
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.