On 2019-01-11 16:47, Christopher Morrow wrote:


Maybe the question to ask is: "What is this cert doing, what happens
if you lose control of the key material for it?"
That should guide how long a certificate could be outside of your
control... and thus the length of validity of the cert?

Agreed, especially on the "what happens when you lose it" point..

Additionally, while prefix/origin AS binding should be more stable than websites even with the relatively short validity periods used for webPKI (which were in part an artifact of people having to pay for TLS/SSL certificates on an annual basis until all the freebies emerged and more recently the CAB forum setting max validity to ~2 years a year or so ago, IIRC) the overall revocation model going the way of webPKI (e.g., punt non-expired but revoked certs out of CRLs for various reasons, wholly ignore CRLs in relying party software because of startup and processing issues, etc..) isn't a desirable thing, methinks... Shorter timeframes (e.g., 1-3 years) forces better hygiene earlier in the deployment process as well.

-danny
_______________________________________________
arin-tech-discuss mailing list
[email protected]
https://lists.arin.net/mailman/listinfo/arin-tech-discuss

Reply via email to