On 2015-12-12, Kevin Chadwick <m8il1i...@gmail.com> wrote:
>> > and have to keep changing the cert every year.  
>> 
>> Your certificate cycling process should be automated, and it should
>> happen more frequently than once a year.
>
> Complete nonsense
>
> firstly and not a major point but you may have greater security than
> automating key changes and secondly the only reason you may want to is
> if you believe your key is not strong enough, in which case use a
> stronger key. It has *little* to do with time really but more to do with
> the amount of traffic the key has been used for and whether PFS has
> solely been used.

It's not so much about replacing keys which aren't strong enough (and
actually you can just replace the old key+cert in that case), it's
about dealing with compromised keys.

Certificate revocation is a disaster area. CRLs are often not checked
at all (letsencrypt aren't even generating CRL entries for end-user
certs - startssl will do but they charge for them, even for free
certs). OCSP is probably checked more often in browsers than CRLs
but fails open in some cases (and has terrible UI in others) and
again isn't used universally - keeping certificate lifetimes short
is a useful way to limit the damage that can be done by a compromised
key. (and if letsencrypt *were* to start doing CRLs for revoked
end-user certs, keeping lifetimes short would also limit the file
size of the CRL).

Reply via email to