[Cryptography] New SSL/TLS certs to each live no longer than 47 days by 2029
Kent Borg
kentborg at borg.org
Fri Apr 18 08:42:14 EDT 2025
On 4/17/25 9:55 PM, Peter Gutmann wrote:
> Bruce Schneier had a great quote around this at the time, something like "the
> claim is that if we didn't have SSL [with all the PKI folderol], chaos would
> result. Turn off SSL on your computer/server and watch the complete lack of
> chaos that results".
I also saw Schneier once say that there is no need for password bullet
characters because shoulder-surfing is no longer a big problem. Except
it is *because* of obscured password typing that shoulder-surfing is no
longer such a problem. Sure, if one login didn't obscure password typing
the world wouldn't end, but if all those bullets were turned to clear
text on every login it would *become* a problem. (He did correct
himself. He is human, but not an idiot.)
I think the same is true of with MitM attacks. One server going without
SSL wouldn't be the end of the world either. But if all certificates
went away MitM attacks would *become* a problem. (And all those
fear-sold VPN products would finally have a reason.)
The rickety certificate system does accomplish something, even if it
isn't the best way to do so.
-kb, the Kent who has this image in his head of certificate renewals
spinning faster and faster until the system destroys itself, a bit like
Iranian centrifuges spinning themselves to destruction, but in this case
naïvely self-inflicted and not because of something malicious, a la Stuxnet.
P.S. No, I do not think Let's Encrypt will turn the expiration times
down to a vanishingly small value. I think they will turn them down to
some small value that they can sustain, and stop at that. That is, they
will stop at a value they can sustain until there is a bump in the road,
so to speak, and *then* the whole system flies apart in a spectacular
way. At that point it doesn't have to be a DDoS attack, just that
something goes wrong. And there is no way to keep things from going
wrong. But there are ways to design systems so they are brittle or so
that they are supple--whether they fail big or fail little--when things
*do* go wrong.
More information about the cryptography
mailing list