Skip to content

Conversation

@gregtwallace
Copy link

Closes #8196

Over the coming years, the Browser CA Baseline Requirements require shorter and shorter certificate validity periods. see: https://cabforum.org/working-groups/server/baseline-requirements/requirements/ s.6.3.2.

As such, expiration warnings should not be static in length. Instead they should adapt based on a certificate's overall validity. Let's Encrypt has published guidance on this issue: https://letsencrypt.org/docs/integration-guide/#when-to-renew

This PR changes the certificate expiration warning to a "due for renewal" warning and implements logic that applies Let's Encrypts guidance. i.e.,

For short lived certificates (< 10 days of validity) the warning is issued after 50% of the validity has lapsed.
For all other certificates (>= 10 days of validity) the warning is issued after 66.6% of the validity has lapsed.

TODO: Translations needed to be updated.

Implement best practices suggested by Let's Encrypt:
Certs >= 10 days of validity - suggest renewal after 2/3 of validity has lapsed
Certs < 10 days of validity - suggest renewal after 1/2 of validity has lapsed

Revise warning message to clarify the cert is due for renewal, not necessarily imminently expiring (translations still need updating)
Copy link

@windsurf-bot windsurf-bot bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 To request another review, post a new comment with "/windsurf-review".

Co-authored-by: windsurf-bot[bot] <189301087+windsurf-bot[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Certificate expiry warning should be relative to the certificate's validity

1 participant