-
-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
398-day limit on cert lifespan starting Sept 1, 2020 - will this break mkcert? #276
Comments
I'm actually seeing Chrome enforce this with Someone pointed out to me that imriz@6c86a71 would fix this, but I also noticed that there's not a way to control the expiration, which would be handy to at least get me a functional certificate while I figure out why Chrome has decided to apply this rule prematurely. |
@rfay me too 😭 🙈 |
I am on Linux with Chrome version
I don't believe it applies to
Does not apply to locally-operated CAs, only publicly trusted CAs as acknowledged by Google. The linked Apple document also states the following:
The previous change to 825 days from June 2019 seemed a bit more broad of an enforcement than this one. Mozilla has further clarification:
There has been another link shared in one of the related issues about this change(not the ZDNet one), this one has a bit more clarity from the comments section with the author responding:
TL;DROnly public leaf certificates should be affected. These have publicly trusted root CAs, as in the default ones installed with your system/client. See public vs private trust. I could be mistaken with desktops. On Android, I imported my So I don't see this being an issue for leaf certs, nor the root CAs, only the leaf certs that are issued with a start date from 1st Sep 2020, which won't happen with Related: #241 Related(but not specific to Sep 2020 change): #238 |
@orlandothoeny it's in your systems trust store? What if you make a leaf certificate from it(eg with Caddy)? I'm on v87 of Chrome (dev/beta) but on Linux and I haven't noticed any issues with private root certs having 10 years validity. I haven't used mkcert in September with an issue date to verify though, last testing was earlier in the month with Caddy, it issues a 10 year root certificate that I added to my trust store, then intermediate and leaf certificates from that. Presently working with smallstep certs where root is again 10 years, but I've not tried these with Chrome yet. Have you tried issuing the certificate for something other than localhost? Say |
None of the 1 year rules affect publicly trusted certificates. The only rule that applies is the 825 days one, which since mkcert v1.4.1 we are bypassing by backdating the certificates. If anyone encounters the ERR_CERT_VALIDITY_TOO_LONG error, they should update mkcert to the latest version and generate a new certificate. (No need to reinstall the root.) |
I know there's been lots of talk about this but I don't see an open issue. As of September 1, 2020,
(zdnet article)
mkcert certs have an 11-year lifespan, but the issue date is May 31, 2019. IIRC the issue date dodged another clamp-down last year, and certs issued before June 1, 2019 were allowed.
But I'm concerned and would like reassurance that mkcert certs will work OK in Fall, 2020.
Thanks!
The text was updated successfully, but these errors were encountered: