Let’s Encrypt changes course on certificate revocation
Enlarge / Certificate revocation isn't normally handled with boltcutters. (credit: Jan Kalib CC BY-SA 2.0)
Earlier this week, Let's Encrypt announced that it would revoke roughly three million-2.6 percent-of its currently active certificates. Last night, however, the organization announced that it would delay the revocation of many of those certificates in the interest of Internet health.
The impact of the revocation on system administrators was and is significant due to the very short window of maintenance allowed before the revocation went into effect. Roughly thirty-six hours were available from the initial announcement to the beginning of scheduled certificate revocation. Half an hour prior to the scheduled revocations, more than one million affected certificates had still not been renewed, and Let's Encrypt announced an additional delay to give administrators more time.
The revocations are necessary because of a bug in Let's Encrypt's CA (Certificate Authority) code, which allowed some domains to go unchecked for CAA (Certificate Authority Authorization) DNS record compliance. Although the vast majority of the certificates revoked posed no security risk, they were not issued in full compliance with security standards. Let's Encrypt's decision to rapidly revoke them all is in compliance with both the letter and spirit of security regulations.
Read 4 remaining paragraphs | Comments