Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»Preparing for TLS certificate lifetimes dropping from 398 days to 47 days by 2029

    Preparing for TLS certificate lifetimes dropping from 398 days to 47 days by 2029

    April 30, 2025

    Earlier this month, the Certification Authority(CA)/Browser Forum voted to significantly shorten the lifetime of TLS certificates: from 398 days currently to 47 days by March 15, 2029.

    The CA/Browser Forum is a collective of certificate issuers, browsers, and other applications that use certificates, and they’ve long been discussing the potential for shorter certificate lifetimes. 

    As a result of this vote to change the TLS certificate lifetime, the lifetimes will gradually shorten over the next 5 years. Starting March 15, 2026, the maximum lifetime will be 200 days, and then a year after that it will drop down to 100 days. Two years following that deadline, certificate lifetimes will hit the new limit of 47 days on March 15, 2029. 

    Additionally, starting March 15, 2029, the maximum period that domain validation information can be reused will be 10 days. Otherwise, it will follow the same schedule as the certificate lifetimes (398 days currently, 200 days after March 15, 2026, and 100 days after March 15, 2027).

    Dean Coclin, senior director of Industry Strategy at DigiCert, joined us on our podcast this week to discuss the vote and the changes, and he said that one of the main drivers behind this change is to make the internet safer. Currently, there are two types of certificate revocation processes that are used. 

    One is the certificate revocation list (CRL), which is a static list of revoked certificates that needs to be frequently checked manually. 

    The other is the Online Certificate Status Protocol (OCSP), where the browser checks back with the CA’s certificate status list to see if the certificate is good. 

    “Each of those technologies has some drawbacks,” Coclin said. “For example, CRL can become very, very large and can slow down your web browsing. And the second one, OCSP, has some sort of privacy implications because every time your browser makes a request to the certificate authority to check the status of a certificate, some information is leaked, like where that IP address is coming from that’s checking that website, and what is the website that’s being checked.”

    Because neither solution is ideal, there became interest in shortening the validity period of certificates to reduce the amount of time a bad certificate could be in use.  

    Google had initially proposed a 90 day certificate lifetime, and then last year Apple proposed going even shorter to 47 days, which is ultimately the decision that was passed. 

    According to Coclin, automation will be key to keeping up with shorter lifetimes, and part of the reason this change is so gradual is to give people time to put those systems in place and adjust. 

    “The days of being able to keep an eye on certificate expirations with a calendar reminder or a spreadsheet are really going to be over. Now you’re going to have to automate the renewal of these certificates, otherwise, you’re going to face an outage, which can be devastating,” he said. 

    There are several technologies out there already that help with this automation, such as the ACME protocol, which automates the verification and issuance of certificates. It was created by the Internet Security Research Group and published as an open standard by the Internet Engineering Task Force (IETF). 

    Certificate issuers also offer their own tools that can help automate the process, such as DigiCert’s Trust Lifecycle Manager.

    Coclin believes that once automation is in place, it’s possible that in the future, the certificate lifetimes may decrease further, potentially even to 10 days or less. 

    “That’s only going to be possible when the community at large adopts automation,” he said. “So I think this ballot, the purpose of this was to encourage users to start getting automation under their belts, making sure that websites do not have outages, because automation will avoid that, and getting ready for a possible even shorter validity time frame to make the likelihood of a revoked certificate being active less likely.”

    The post Preparing for TLS certificate lifetimes dropping from 398 days to 47 days by 2029 appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleResearchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense
    Next Article Perficient Wins the Gold: Globee® Customer Excellence Award for Customer Success Story 

    Related Posts

    Tech & Work

    CodeSOD: A Unique Way to Primary Key

    July 22, 2025
    Tech & Work

    BrowserStack launches Figma plugin for detecting accessibility issues in design phase

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-27387 – OPPO Clone Phone Weak Password WiFi Hotspot Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-45885 – PHPGURUKUL Vehicle Parking Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-20272 – Cisco Prime Infrastructure and EPNM Blind SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-0467 – VMware GPU Firmware Memory Corruption

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem

    June 18, 2025

    SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem

    Full Disclosure
    mailing list archives
    SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem
    From: SEC Consult Vulnerability Lab via Fulldisclosure
    Read more

    Published Date:
    Jun 18, 2025 (1 hour, 29 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-26412

    Linux Candy: doge – simple motd script

    April 19, 2025

    Exploring GitHub CLI: How to interact with GitHub’s GraphQL API endpoint

    April 22, 2025

    CVE-2025-53161 – VMware Network Policy Vulnerability: Denial of Service

    June 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.