Skip to content

Automated TLS certificate renewal #10238

@lhoguin

Description

@lhoguin

Is your feature request related to a problem? Please describe.
The CA/Browsers working group has decided on a change to the maximum validity of TLS certificates issued by public CAs, that is currently 398 days and will be gradually lowered over the next few years before becoming 47 days in 2029. This pretty much requires implementing automated certificate renewal solutions (such as using the ACME protocol).

Describe the solution you'd like
This likely fits better as part of OTP (a new application perhaps, or as part of ssl) because this impacts all users with public facing servers, as well as those that use public CAs to get certificates for their internal services.

Describe alternatives you've considered
Rewind time to get the proposal rejected.

Making an application outside of OTP but as mentioned before this is the kind of application that is near-ubiquitous so it's a better fit in OTP.

Additional context

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions