<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: phasmantistes</title><link>https://news.ycombinator.com/user?id=phasmantistes</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 16 Apr 2026 23:53:39 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=phasmantistes" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by phasmantistes in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Yep, the "shortlived" (6-day) profile will be available to the general public later this week. But at this time we explicitly encourage only mature organizations with stable infrastructure and an oncall rotation to adopt that profile, as the risks associated with a renewal failing at the beginning of a holiday long weekend are just too high for many sites.</p>
]]></description><pubDate>Tue, 16 Dec 2025 06:47:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46285538</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46285538</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46285538</guid></item><item><title><![CDATA[New comment by phasmantistes in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Honest reply: because the infrastructure isn't ready to support 1-day certificates yet. If your cert is only valid for one day, and renewal fails on a Saturday, then your site is unusable until you get back to work on Monday and do something to fix it. There are things that can be done to mitigate this risk, like using an ACME client which supports fallback between multiple CAs, but the vast majority of sites out there today simply aren't set up to handle that yet.<p>The point of the CA/BF settling on 47-day certs is yes, to strongly push automation, but also to still allow time for manual intervention when automation fails.</p>
]]></description><pubDate>Tue, 16 Dec 2025 06:45:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46285527</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46285527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46285527</guid></item><item><title><![CDATA[New comment by phasmantistes in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>FWIW, we're <i>acutely</i> aware of the operational risks of super short lifetimes and frequent renewals. That's why our `shortlived` profile is clearly documented as only being appropriate for orgs that have high operational maturity and an oncall rotation. We carry pagers too, and if LE goes down for 48 hours, we'll be desperately trying <i>not</i> to take out a huge chunk of the Internet.</p>
]]></description><pubDate>Tue, 16 Dec 2025 06:40:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46285503</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46285503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46285503</guid></item><item><title><![CDATA[New comment by phasmantistes in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Yep! Should be available to the general public (as long as you're using an ACME client that can be configured to request a specific profile) later this week.</p>
]]></description><pubDate>Tue, 16 Dec 2025 06:28:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46285442</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46285442</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46285442</guid></item><item><title><![CDATA[New comment by phasmantistes in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>It's a good question! I know that our first root (ISRG Root X1) used that naming scheme simply because it was cross-signed by IdenTrust's root (DST Root CA X3) which used that same scheme. But where they got the scheme from, I don't know.<p>Using Y to denote the "next generation" of roots is a scheme I came up with in the past year while planning our YE/YR ceremony, so it's certainly not something that people were thinking about when they named the first roots.</p>
]]></description><pubDate>Tue, 16 Dec 2025 06:26:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46285434</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46285434</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46285434</guid></item><item><title><![CDATA[New comment by phasmantistes in "Decreasing Certificate Lifetimes to 45 Days"]]></title><description><![CDATA[
<p>Certificates that look like renewals -- for the same set of names, from the same account -- are exempt from rate limits. This means that renewing (for example) every 30 days instead of every 60 days will not cost any rate limit tokens or require any rate limit overrides.</p>
]]></description><pubDate>Tue, 02 Dec 2025 18:13:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46124366</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46124366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46124366</guid></item><item><title><![CDATA[New comment by phasmantistes in "Decreasing Certificate Lifetimes to 45 Days"]]></title><description><![CDATA[
<p>Organizations with many frontends/loadbalancers all serving the same site tend to adopt one of four solutions:<p>- Have one node with its own ACME account. It controls key generation and certificate renewal, and then the new key+cert is copied to all nodes that need it. Some people don't like this solution because it means you're copying private keys around your infrastructure.<p>- Have one node with its own ACME account. The other nodes generate their own TLS keys, then provide a CSR to the central node and ask it to do the ACME renewal flow on their behalf. This means you're never copying keys around, but it means that central node needs to (essentially) be an ACME server of its own, which is a more complex process to run.<p>- Have one ACME account, but copy its account key to every node. Have each node be in charge of its own renewal, all using that shared account. This again requires copying private keys around (though this time its the ACME key and not the TLS key).<p>- Give every node its own ACME account, and have each node be in charge of its own renewal.<p>The last solution is arguably the easiest. None of the nodes have to care about any of the others. However, it might run into rate limits; for example, LE limits the number of new account registrations per IPv6 range, so if you spin up a bunch of nodes all at once, some of them might fail to register their new accounts. And if your organization is large enough, it might run into some of LE's other rate limits, like the raw certificates-per-domain limit. Any of the above solutions would run into that rate limit at the same time, but rate limit <i>overrides</i> are most easily granted on a per-account basis, so having all the nodes share one account is useful in that regard.<p>Another factor in the decision-making process is what challenge you're using. If you're using a DNS-based challenge, then any of these solutions work equally well (though you may prefer to use one of the centralized solutions so that your DNS API keys don't have to live on every individual node). If you're using an HTTP-based challenge, you might be <i>required</i> to use a centralized solution, if you can't control which of your frontends receives the HTTP request for the challenge token.<p>Anyway, all of that is a long-winded way to say "there's no particularly wrong or right answer". What you're doing right now makes sense for your scale, IMO.</p>
]]></description><pubDate>Tue, 02 Dec 2025 18:05:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46124263</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46124263</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46124263</guid></item><item><title><![CDATA[New comment by phasmantistes in "Decreasing Certificate Lifetimes to 45 Days"]]></title><description><![CDATA[
<p>"CT Logs" are Certificate Transparency Logs, which are cryptographically provable append-only data structures hosted by trusted operators. Every certificate issued is publicly logged in two or more CT Logs, so that browsers can ensure that CAs aren't lying about what certs they have or have not issued.<p>Reducing the lifetime of certificates increases the number of certificates that have to be issued, and therefore the number of certs that are logged to CT. This increases the cost to CT operators, which is unfortunate since the set of operators is currently very small.<p>However, a number of recent improvements (like static-ct-api and the upcoming Merkle Tree Certs) are making great strides in reducing the cost of operating a CT log, so we think that the ecosystem will be able to keep up with reductions in cert lifetime.</p>
]]></description><pubDate>Tue, 02 Dec 2025 17:49:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46124075</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46124075</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46124075</guid></item><item><title><![CDATA[New comment by phasmantistes in "Decreasing Certificate Lifetimes to 45 Days"]]></title><description><![CDATA[
<p>Please don't suggest pinning a publicly-trusted intermediate. The CA may change which intermediate they're using at any time for any reason with no warning, and then the app which pinned that intermediate is hosed.</p>
]]></description><pubDate>Tue, 02 Dec 2025 17:44:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46124008</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=46124008</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46124008</guid></item><item><title><![CDATA[New comment by phasmantistes in "Cloudflare Global Network experiencing issues"]]></title><description><![CDATA[
<p>(Disclaimer: I am tech lead of Let's Encrypt software engineering)<p>I'm also concerned about LE being a single point of failure for the internet! I really wish there were other free and open CAs out there. Our goal is to encrypt the web, not to perpetuate ourselves.<p>That said, I'm not sure the line of reasoning here really holds up? There's a big difference between this three-hour outage and the multi-day outage that would be necessary to prevent certificate renewal, even with 6-day certs. And there's an even bigger difference between this sort of network disruption and the kind of compromise that would be necessary to take LE out permanently.<p>So while yes, I share your fear about the internet-wide impact of total Let's Encrypt collapse, I don't think that these situations are particularly analogous.</p>
]]></description><pubDate>Tue, 18 Nov 2025 18:12:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45969899</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=45969899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45969899</guid></item><item><title><![CDATA[New comment by phasmantistes in "Letsencrypt will kill SMTP server auth following Chrome CA policy change"]]></title><description><![CDATA[
<p>That's not leverage that a CA can use. If half the internet suddenly displays TLS warning interstitials, it doesn't make people mad at the CA, and it doesn't make people mad at their browser: it just _trains them to ignore such warnings_. That's a bad outcome all around, and one that a CA whose core purpose is improving security for end-users cannot condone.</p>
]]></description><pubDate>Fri, 16 May 2025 15:38:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=44006741</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=44006741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44006741</guid></item><item><title><![CDATA[New comment by phasmantistes in "Letsencrypt will kill SMTP server auth following Chrome CA policy change"]]></title><description><![CDATA[
<p>The "tlsclient" profile will not be TLSClientAuth-only: it will have both the TLSServerAuth and TLSClientAuth profiles, like the default profile does today. It will exist solely for the purpose of helping people transition off of using Let's Encrypt certificates for mTLS. If they've been unaware of these conversations, their systems will break when the TLSClientAuth EKU is removed from the default profile. That will be their wake-up call, and then they can temporarily select the "tlsclient" profile to get a brief grace period to migrate their systems before the TLSClientAuth EKU is removed entirely.</p>
]]></description><pubDate>Fri, 16 May 2025 15:11:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=44006447</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=44006447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44006447</guid></item><item><title><![CDATA[New comment by phasmantistes in "Six day and IP address certificate options in 2025"]]></title><description><![CDATA[
<p>This is exactly why the LE IP certs will be limited to 6 days: this exact attack is possible today against any IP address cert, and such certs in general are allowed to have lifetimes up to 398 days. LE isn't comfortable with that situation, so IP certs will have the  shortest feasible lifetimes.</p>
]]></description><pubDate>Thu, 16 Jan 2025 21:17:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=42731021</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=42731021</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42731021</guid></item><item><title><![CDATA[New comment by phasmantistes in "Intent to end OCSP service"]]></title><description><![CDATA[
<p>For what it's worth, the person you're replying to is the founder and executive director of Let's Encrypt, the non-profit free and open CA which decidedly isn't a money-printing machine.</p>
]]></description><pubDate>Tue, 23 Jul 2024 22:16:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41051552</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=41051552</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41051552</guid></item><item><title><![CDATA[New comment by phasmantistes in "Intent to end OCSP service"]]></title><description><![CDATA[
<p>CAs need to know every certificate they've issued so that<p>a) if they receive a request to revoke that certificate, they can actually do so; and<p>b) if they need to revoke <i>all</i> of their certs (e.g. due to discovering a validation process failure) they don't miss any.</p>
]]></description><pubDate>Tue, 23 Jul 2024 17:57:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=41048913</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=41048913</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41048913</guid></item><item><title><![CDATA[New comment by phasmantistes in "Intent to end OCSP service"]]></title><description><![CDATA[
<p>Not all subscribers provide email addresses through which they could be informed of a revocation.</p>
]]></description><pubDate>Tue, 23 Jul 2024 16:52:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=41048228</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=41048228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41048228</guid></item><item><title><![CDATA[New comment by phasmantistes in "Intent to end OCSP service"]]></title><description><![CDATA[
<p>Nothing will change for you, and nothing will break. The point of this post is to give a maximum-lead-time heads-up to the folks who _do_ need to care (the folks writing revocation-checking code in clients) so that later, more specific announcements don't come as a surprise.</p>
]]></description><pubDate>Tue, 23 Jul 2024 16:47:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41048165</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=41048165</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41048165</guid></item><item><title><![CDATA[New comment by phasmantistes in "New Intermediate Certificates"]]></title><description><![CDATA[
<p>I <i>believe</i> they are using "certbot" to mean "Let's Encrypt", in which case their advice is sound -- if you truly have to pin a key, pin your own end-entity cert's key, not the CA's key.</p>
]]></description><pubDate>Tue, 19 Mar 2024 15:45:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=39756959</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=39756959</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39756959</guid></item><item><title><![CDATA[New comment by phasmantistes in "New Intermediate Certificates"]]></title><description><![CDATA[
<p>It's specifically to discourage <i>intermediate</i> key pinning. If folks want to pin their own end-entity public key (and always re-use the same key when renewing their cert), go for it -- dealing with compromise of their own key is their own problem to solve. Or if they want to pin a root public key to ensure some other CA doesn't issue a MITM certificate, go for it (although that doesn't prevent a bad actor from getting the <i>same</i> CA to issue a MITM certificate; there are other mechanisms to prevent that).<p>Just please don't pin intermediate CA keys, which should be opaque to the end-user and need to be able to change quickly without breaking a bunch of apps.</p>
]]></description><pubDate>Tue, 19 Mar 2024 15:31:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=39756806</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=39756806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39756806</guid></item><item><title><![CDATA[New comment by phasmantistes in "Sunlight, a Certificate Transparency log implementation"]]></title><description><![CDATA[
<p>I'm super excited about Sunlight. The CT ecosystem is really fragile right now, with current log implemetations being expensive to operate and very difficult to operate correctly, as evidenced by the recent failures of multiple logs[1][2]. And if too many logs fall over, it becomes infeasible to include the requisite number of SCTs in certificates, or worse, already-issued certificates can become effectively untrusted.<p>With Sunlight reducing costs by a couple orders or magnitude and significantly easing deployment complexity, it will be a huge boon to the whole ecosystem. I really hope log monitors begin crawling sunlight logs and browsers accept them as trusted in the near future.<p>[1]:  <a href="https://groups.google.com/a/chromium.org/g/ct-policy/c/6mvSoETm9Qk" rel="nofollow">https://groups.google.com/a/chromium.org/g/ct-policy/c/6mvSo...</a><p>[2]: <a href="https://groups.google.com/a/chromium.org/g/ct-policy/c/_dhkSzwoZuE" rel="nofollow">https://groups.google.com/a/chromium.org/g/ct-policy/c/_dhkS...</a></p>
]]></description><pubDate>Fri, 15 Mar 2024 14:54:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=39716447</link><dc:creator>phasmantistes</dc:creator><comments>https://news.ycombinator.com/item?id=39716447</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39716447</guid></item></channel></rss>