Podcast
Root Causes 73: Apple to Drop Support for Two-year SSL Certificates


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
March 13, 2020
At the most recent Face-to-Face meeting of the CA/Browser Forum, Apple announced that as of September 1 it will distrust public TLS certificates issued with terms longer than thirteen months for all its technology products. Join our hosts as they discuss this change, its affect on the ecosystem, and what you need to do to prepare for one-year SSL certificates.
Podcast Transcript
Lightly edited for flow and brevity.
So, we have talked about certificate lifetimes in the past and shortening certificate lifetimes and so following up on that conversation, that ongoing thread there certainly was big news from Apple at the latest CA Browser forum face-to-face meeting where essentially Apple announced that moving forward starting on a certain specific date, it was only going to honor one-year public SSL certificates.
If you take a normal year, you add a day in case it’s a leap year. So, you are up to 366 days and then you add the longest possible month, 31 days, now you are 397 days. So, the way I interpret this is it’s the longest possible interpretation under any circumstances of the concept of 13 months plus one day. And what that means is that CAs essentially can offer 13-month certificates.
So, it’s a common practice in the public certificate world to allow somebody to renew early so they don’t have this crisis where they are trying to swap out the cert the same day it renews, but people are notoriously cheap, right, Jay? So, one of the things that they do is they wait until the last possible instance to renew their certs and that creates problems. So, what CAs have had as a practice for a long time is, they allow early renewal. And what early renewal means is I will make the new cert terminate one year after the end of the cert that you are renewing, and I’ll give you those extra days. Those 15/20 days, whatever it is, and that gives you an opportunity to install the new one while the old one is still running so you don’t have this crisis. And, so, you know, certainly Apple obviously respects the value of that practice and has left that in place, has made it possible for any CA to say, ok, I’ll give you your cert is due on the 21st, the next one will be due on the 21st, right? That’s basically the idea. Give it up to one month early and with that number of days you can do that plus you have one more day for padding, so you don’t have any worries about time zones or things like that. So, that seems to me what Apple is up to with that, and it seems to be a very well-considered, carefully considered and I would say correctly arrived at, number of days and it shows us a couple things.
One is it shows us that Apple thought this through carefully. It shows us that Apple was paying attention to how these things were really used and it shows us that Apple is trying to do this in a way that is as minimally disruptive to subscribers as possible. So, those are three good takeaways.
This is how we like to see browsers take unilateral action when they do. Often, they do it that way very carefully and responsibly. Sometimes they don’t, but we really like it when they do, and this is a good example of Apple getting it right.
What are some of the arguments people are making to not have this one-year or to continue with the two-year? Because I’m sure that there is some pushback and I’m sure there is some legitimate reasons, but, you know, how do to respond to that?
Now, the response to that is - - response number one is like what you said, Jay, how about automation? And then the argument sort of goes, well, you know, not everything is automatable so if you are a born-in-the-cloud, five-year-old tech company, you probably build everything from the ground up in a way where this is no problem for you. But if I am a legacy business and, you know, I’m in some non-technology field and my company has been around 150 years and I’ve still got things somewhere in the world running on Fortran then it’s maybe a lot more difficult to go in and make these kinds of changes and to say we can’t just go retrofit our systems to all be automated so quickly and so overnight. So, this debate goes back and forth.
Why do this? Why did the browsers do this? And it’s really three things. The first one is the point you are making, Jay, which is that all else being equal a shorter-lived certificate is more secure. More secure just like - - do a thought experiment with me. Let’s suppose on day 87 of the certificate’s life span someone manages to steal your private key and you don’t know about it. Well, if you have a 90-day cert they have three days to exploit it. If you have a one-year cert they have nine months to exploit it. If you have a two-year cert, they have 27 months or 33 months to exploit it. Right? So, in that sense - - sorry 21 months to exploit it. Bad math, Tim. In that sense, the amount of time, right, the amount of jeopardy with a cert just goes up over time and imagine like what if a cert was issued to a wrong party and nobody knew and etc., etc. So, for all those reasons shorter-lived certs are just considered to be less dangerous.
The second one which I don’t think is very important, but it is a thing is this idea of a domain certificate ownership mismatch. So, let’s say I own a domain. Domain names change ownerships. So, if I own a domain name. I know I own Tim.com, and I go buy a two-year cert for it and then I don’t renew Tim.com tomorrow and somebody else goes and picks it up or I sell that domain. Now what happens is I have a nearly two-year long cert that’s authentically issued off an authentic trusted root for a domain that I don’t control. Now I’m not worried about it because I have trouble understanding what the attack is. It’s not like I’m going to go out and get my juicy high value target domain and then go sell it to the exact person I want to attack and then use my cert to do my man-in-the-middle and somehow get away with all these shenanigans. Like it’s not a real-world scenario but it bothers some people.
And then the last one, which I also think is valid is the argument about crypto agility and the argument basically goes as follows. Look, there are some people who just aren’t going to swap out their certs. It doesn’t matter. We saw this with the Debian flaw. We saw this with SHA-1. There are some people, it doesn’t matter how many times you tell them or how many ways you tell them, they just don’t swap out their certs and by limiting the maximum life span of a public cert of a cert type you are limiting the maximum life span of a particular flaw that must be gotten away from and therefore you’ve improved your crypto agility and I do think there is validity to that as well. So, you know, those points are the ones that are always advanced by the browsers and then again, the, look, you are really hurting subscribers for what are theoretical concerns is what’s always advanced on the other side.
You know, we feel that it was just a matter of time that progress had been made, a lot of progress was made, and more progress was going to be made and somewhere along the line we had to pick a point in time to make the change and this was a good point. But Apple has taken it out of the CA Browser Forum’s hands and now we are all just going to do it because we need to work with Apple’s technology stack.
Number one. The date that it takes place is September 1. So as of September 1, that’s when the 398-day requirement occurs and just to be clear that doesn’t mean that your two-year certificate that was issued prior to that is gonna stop working on September 1. What I mean by that is certificates issued on or after September 1 have this requirement. So, on August 31 if you can go get yourself a two-year certificate it will work for the full duration. That’ll be just fine. As of September 1, if you get a two-year certificate, it will stop working instantly. Not in a year. But now. So, that’s how they are running that and that is important because that means that everybody who has a two-year cert today or everybody who has been expecting to buy a two-year cert 60 days from now and that’s fully what they were expecting, you can keep going with your plans and there won’t be any problems. Just remember that deadline comes up on September 1 and your public CAs are gonna stop offering you those certs anyways. So, you won’t have much choice.
And then the other part that’s connected to that is, let’s be clear, this is for public TLS certificates only. Apple is not doing anything to S/MIME. They are not doing anything to code signing. They’ll still have the three-year allowed durations that they have today and if you are using your own root and you are using private TLS certificates, you can do whatever you want with them. So, it’s just the public TLS certificates that Apple is putting this restriction on and this does apply to the entire Apple technology stack - iOS, Mac OS, iPad OS, the services, everything. So, the whole Apple shebang is tied to this behavior and this announcement.
So, take it very seriously. Those are your dates. Those are the things you need to know. If you need any clarification on any of this, we are very aware of what’s going on. We can tell you all about it if you just reach out to Sectigo.
So, important news for the listeners. Thank you so much, Jay. As always, it’s a pleasure talking to you.

