this post was submitted on 02 Dec 2025
344 points (99.1% liked)

Selfhosted

53285 readers
1038 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Let’s Encrypt will be reducing the validity period of the certificates we issue. We currently issue certificates valid for 90 days, which will be cut in half to 45 days by 2028.
This change is being made along with the rest of the industry, as required by the CA/Browser Forum Baseline Requirements, which set the technical requirements that we must follow. All publicly-trusted Certificate Authorities like Let’s Encrypt will be making similar changes. Reducing how long certificates are valid for helps improve the security of the internet, by limiting the scope of compromise, and making certificate revocation technologies more efficient.

you are viewing a single comment's thread
view the rest of the comments
[–] Passerby6497@lemmy.world 28 points 20 hours ago (2 children)

I've been dreading this switch for months (I still am, but I have been, too!) considering this year and next year will each double the amount of cert work my team has to do. But, I'm hopeful that the automation work I'm doing will pay off in the long run.

[–] non_burglar@lemmy.world 40 points 20 hours ago (1 children)

Are you not using LE certbot to handle renewals? I can't even imagine doing this manually.

[–] Passerby6497@lemmy.world 28 points 20 hours ago (2 children)

Personally, yes. Everything is behind NPM and SSL cert management is handled by certbot.

Professionally? LOL NO. Shit is manual and usually regulated to overnight staff. Been working on getting to the point it is automated though, but too many bespoke apps for anyone to have cared enough to automate the process before me.

[–] groet@feddit.org 5 points 13 hours ago

One reason for the short certs is to push faster adoption of new technology. Yes that's about new cryptography in the certs but if you still change all your certs by hand maybe you need to be forced ...

[–] Zanathos@lemmy.world 3 points 9 hours ago (1 children)

I'm in the same boat here. I keep sounding the alarm and am making moves so that MY systems won't be impacted, but it's not holding water with the other people I work with and the systems they manage. I'm torn between manual intervention to get it started or just letting them deal with it themselves once we hit 45 day renewal periods.

[–] LordKitsuna@lemmy.world 3 points 8 hours ago (1 children)

Can you not just setup an nginx reverse proxy at the network edge to handle the ssl for the domain(s) and not have to worry about the app itself being setup for it? That's how I've always managed all software personal or professional

[–] Zanathos@lemmy.world 1 points 6 hours ago (1 children)

Unfortunately some apps require the certificate be bound to the internal application, and need to be done so through cli or other methods not easily automated. We could front load over reverse proxy but we would still need to take the proxy cert and bind to the internal service for communication to work properly. Thankfully that's for my other team to figure out as I already have a migration plan for systems I manage.

[–] eclipse@lemmy.world 1 points 5 hours ago (1 children)

Why can't you just have a long lived internally signed cert on your archaic apps and LE at the edge on a modern proxy? It's easy enough to have the proxy trust the internal cert and connect to your backend service that shouldn't know the difference if there's a proxy or not.

Or is your problem client side?

[–] sparky@lemmy.federate.cc 1 points 2 hours ago

That’s actually a really good idea. I’m not the person you replied to, but I’m taking notes.

[–] Appoxo@lemmy.dbzer0.com 1 points 16 hours ago

Luckily I am using only traefik and everything goes through it that it needs for.
Can't imagine how annoying it would be to interface with every equipment so there are no https errors...