Package: certbot
Version:  2.1.0-4
Tags: bookworm

Let's Encrypt is switching to short-lived certificates in an attempt
to manage revocations more efficiently.[0,1] The thinking is, by
ensuring the certificate expires quickly, relying parties will have
less reliance on revocations lists in case a CA is compromised.

The problem is practice is, certbot generates a new key pair by
default when renewing a certificate. The new key pair breaks
continuity schemes. Continuity schemes, like public key pinning, are a
better security property than gratuitous key rotation. Pinning a
public key means relying parties no longer need to rely on trust.
("Trust" is what to use when there are no security controls to place,
like public key pinning).

This problem has always existed, but it seems like it is going to
become more acute based on a 6-day lifetime. Asking users who practice
pinning to update their pinsets every 6 days is excessive. It creates
an undue burden on those folks who want the higher assurances provided
by pinning. The issue has been raised with folks on Mozilla's
dev-security-policy mailing list.[2,3]

And according to discussions on Mozilla's dev-security-policy mailing
list, CAs maintain a blacklist of compromised keys. Additionally, a
public database of compromised key pairs is available.[4,5] In both
cases, CAs can refuse to issue a certificate based on a known
compromised key.

Please consider adding the `reuse-key = True` option to certobt's ini
file to promote key continuity. Or, in case certbot is being invoked
via the command line, then use the `--reuse-key` option to promote key
continuity.

[0] A Note from our Executive Director,
<https://letsencrypt.org/2024/12/11/eoy-letter-2024/>
[1] Short-Lived Certificates Coming to Let’s Encrypt,
<https://www.schneier.com/blog/archives/2024/12/short-lived-certificates-coming-to-lets-encrypt.html>
[2] Concerns about very-short-lived certificates,
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/_335unOyteQ/m/3lddQBXgBAAJ>
[3] Let's Encrypt New Intermediate Certificates,
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/L7XoAXt_s1c/m/k_vdk9rQAwAJ>
[4] The Pwnedkeys Revokinator is back!,
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/Ktb2knJUQ20/m/IbUkTLBFBwAJ>
[5] Certificate with compromised key / *.digicert-demo.com,
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/d21mtDJ7YXQ/m/YF2of9RwDAAJ>

Reply via email to