Let’s Encrypt will be reducing the validity period of the certificates we issue. We currently issue certificates valid for 90 days, which will be cut in half to 45 days by 2028.
This change is being made along with the rest of the industry, as required by the CA/Browser Forum Baseline Requirements, which set the technical requirements that we must follow. All publicly-trusted Certificate Authorities like Let’s Encrypt will be making similar changes. Reducing how long certificates are valid for helps improve the security of the internet, by limiting the scope of compromise, and making certificate revocation technologies more efficient.

  • JackbyDev@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    5 hours ago

    Can you not issue your own certificate? I guess it depends on how many devices and what types of devices need to connect. It’s be a one time effort per device (importing your own self signed cert) versus one time effort per service per X days.

    • embMaster@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 hours ago

      I did that for myself a few years back. But i can’t convince my roommates, let’s not even speak of guests, to install a (my) root certificate. My android phone still complains about “possibly supervised network traffic” since back when i installed my root ca. Maybe there is another solution im not aware of, but i can’t think of any

      • JackbyDev@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        It’s so infuriating to me that there isn’t a way to just encrypt traffic without verifying it’s part of a chain. By all means, give a nag warning in browsers, but ugh, I think that ship has long since sailed. Plus, realistically, you’d need just as many scary warnings to deter the average user that they might be getting MITMed.