English | Deutsch | ...


Conditions and Rules for issued certificates - 202506

Expiration times

On April 14, 2025, the CA/Browser Forum passed a ballot to reduce SSL/TLS certificates to 47 day maximum term by March 15, 2029. (https://en.wikipedia.org/wiki/Certificate_authority#cite_note-44)

Certification type

Expiration time proposed in present

Expiration time in the future

Comment

Root CA

20 years

max. 20 years

may be reduced down to 5 years

Subordinate CAs: Person, Client, Server

5 years

max. 5 years

may be reduced down to 2 years

User's (0-49 APs): Person, Client, Server

6 months

200 days (after 20260315), 100 days (after 20270315), 47 days (after 20290315)

Measure against the Quantum-computer breaking

User's (50+ APs): Person, Client, Server

398 days

200 days (after 20260315), 100 days (after 20270315), 47 days (after 20290315)

Measure against the Quantum-computer breaking

The certificate renewal is deprecated

Users are strongly encouraged NOT to renew expired certificates, thus to prefer issuing a new CSR with a new key pair for every certificate they need renew.

CSR Minimum requirements

General

These rules are valid for Certificate Signing Requests (CSRs), which are generated by an utility, as OpenSSL, Kleopatra, or XCA. If an user uses the CAcert Web application, the CSR is generated properly.

Person

The user can select the following items on the certificate generation page.

Client

Server

Some cryptographic algorithms resist against Quantum-computer break

The article https://freemindtronic.com/quantum-computing-threats-rsa-aes/ states:

Reference to the SHA1 hash algorithm

The SHA1 algorithm will be probably replaced by a more sofisticated successor in the future.

More

...?