Hacker News new | past | comments | ask | show | jobs | submit login

> A three months max duration limits the potential liabilities to three months.

But what attack is that blunting?

1. A bad actor with access to the system will just regenerate another LE cert and carry on.

2. A bad actor who has injected a bad cert, but without system access, still has three months to conduct his fraud which is more than enough time to phish 90% of the user-base.

I'm not privy to the LE decision-making process but 90 days seems like the result of a bad compromise. Automated certs should be renewed on a very-high-frequency ( like hourly ) otherwise there's little benefit over the traditional model, and a lot of downsides such as breaking pinning.

90 days seems to have been chosen to be painful enough to push people into adopting auto-renewal but not frequent enough to overload LE's system, and thus not actually providing any security gains.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: