(no title)
jwestbury | 2 years ago
(That said, three months is better than any longer period. The shorter the rotation, the lower the risk -- but, more importantly, the stronger the impetus to build strong automation around the process.)
jwestbury | 2 years ago
(That said, three months is better than any longer period. The shorter the rotation, the lower the risk -- but, more importantly, the stronger the impetus to build strong automation around the process.)
wongarsu|2 years ago
If we lowered the expiration time to say 3 days, with automatic renewal after 2 days, then any breakage on your side or downtime on let's encrypt's side would quickly escalate into https errors. That in turn would train users that those just happen, and make them ignore the big red scary page even when it's an actual attack. That sounds much worse than the small risk from a 30 day certificate.
vbezhenar|2 years ago
That's already happened. I'm encountering LE errors on random websites so much that I don't care and automatically click through warnings. This is especially troublesome because my government keeps MITM me and I don't like it.
red-iron-pine|2 years ago
the lower the risk of compromised certs / keys. certainly not a lower risk of issues, or surprises.
hopefully -- emphasis on hope -- this regular action becomes routine and easy enough to that it is a low risk behavior.