Shortening Let's Encrypt Chain of Trust
https://letsencrypt.org/2023/07/10/cross-sign-expiration.html

Discussion: https://news.ycombinator.com/item?id=36673793
Let's Encrypt is switching to their own root certificate wh. means extremely outdated devices (~2016) will no longer be able to access servers using Let's Encrypt certificates

Pers comment: these people (product) are great. 👍 🙏

https://letsencrypt.org/
Let's Encrypt: https://en.wikipedia.org/wiki/Let%27s_Encrypt

#LetsEncrypt #SSL #TLS #InternetSecurity #HTTTPS #SecureWebsites #X509Certificates #CertificateAuthority

Shortening the Let's Encrypt Chain of Trust

When Let’s Encrypt first launched, we needed to ensure that our certificates were widely trusted. To that end, we arranged to have our intermediate certificates cross-signed by IdenTrust’s DST Root CA X3. This meant that all certificates issued by those intermediates would be trusted, even while our own ISRG Root X1 wasn’t yet. During subsequent years, our Root X1 became widely trusted on its own. Come late 2021, our cross-signed intermediates and DST Root CA X3 itself were expiring. And while all up-to-date browsers at that time trusted our root, over a third of Android devices were still running old versions of the OS which would suddenly stop trusting websites using our certificates. That breakage would have been too widespread, so we arranged for a new cross-sign – this time directly onto our root rather than our intermediates – which would outlive DST Root CA X3 itself. This stopgap allowed those old Android devices to continue trusting our certificates for three more years.

Ach @torproject #Tor jetzt übertreibt ihr aber…

#HTTTPS

😜