Certificate Expiration Times? #669
AustinFoss
started this conversation in
General
Replies: 1 comment 3 replies
-
You could propose that change, but I'd argue against it as shorter lived keys are generally better from a security perspective. Indeed, the industry as a whole has been moving towards shorter and shorter key validity windows. I think someone has linked this before, but you may find the autotls feature useful: https://blog.libp2p.io/autotls/ |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Was looking into a implementing server node that would be reachable by a browser node without a domain name, so of the 3 transports only webrtc and webtransport had self signed certs (from my understanding websockets secure, wss, needs a CA signed cert)
Today someone informed me that the webtransport w3c spec has a limit of 2 weeks for a self signed cert. This posed a problem for my use cause I wanted my server to have a fairly long lived constant multiaddr to act as a boot strap node.
Looking at webrtc I found it has 30 days recommended in the w3c spec, to up to 365. The go libp2p webrtc implementation seems to default to a month. What’s weird is that when I was looking into the rust libp2p webrtc implementation it seems to have a ridiculously long validity time, expires in the year 4096 by default.
For my use if LibP2P ever enforced a 30 day limit for webrtc that wouldn't be the end of the world but would it be worth adding it to the spec that 1 year should be the max?
When I asked From apparently some webrtc certs are quite often set to 10 years for some reason.
Beta Was this translation helpful? Give feedback.
All reactions