-
Notifications
You must be signed in to change notification settings - Fork 118
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit CanSignHttpExchange certificate lifetimes #378
Comments
We talked to @grittygrease from Cloudflare about shorter lifetimes. My (fallible) notes are:
|
@clintwilson asked in #383 that we have "some very rough consensus on max validity" before we codify a particular limit.
The max-validity is not intended to handle CA compromise like DigiNotar as suggested in #383 (comment), since for that browsers would revoke the affected root. So, let's see if we can find rough agreement on a max-validity that we expect to hold until at least January 2020. This could change early if a significant issue comes up or if Mozilla or Safari demand a particular max-validity in order to support the specification, but we won't expect to change it early. I'd like to pick 90 days because LetsEncrypt has shown it can work for lots of server operators, and I don't know of a similar proof of concept for shorter validity periods. I'm going to run a poll by posting 30-, 60-, and 90-day limits as Github comments. Use the 👍 reaction on an option if you're pretty sure it'll work for the ecosystem, and 👎 if you're pretty sure it won't, and feel free to write a longer answer as a comment. Thanks! |
Bound the maximum Validity Period at 30 days. |
Bound the maximum Validity Period at 60 days. |
Bound the maximum Validity Period at 90 days. |
I don't see any objections to 90 days, so I'll merge that as the limit, and will resist calls to change it again until next year. |
Fixed by #383, although folks should feel free to re-open this question in 2020. |
In the blink-dev Intent-to-Ship thread, @AGWA suggests
These requirements may well wind up in the BRs instead of this repository's specs, but this issue will track getting them where they need to go.
The text was updated successfully, but these errors were encountered: