SSL certificate lifetimes are going down. Dates proposed. 45 days by 2027

71 pointsposted 9 months ago
by thunderbong

102 Comments

febusravenga

9 months ago

What is the problem with long lived certs? Is the cryptography behind PKI considered weak nowadays, that you can collect enough material on cert that you can derive privkey? Is there other fundamental cryptographic weakness?

I understand problem of still-valid certs after domain expiration, but mere rotation strikes me as similar to password rotation ... which is currently discouraged.

bawolff

9 months ago

The main issue is lack of a working revocation mechanism.

Servers get compromised sometimes, people do stupid things with keys, etc.

We dont have a really good way of revoking keys after something bad happens. We have some bad ways, but they kind of suck.

An additional reason might be making it easier to punish a misbehabing CA (CAs are often too big to fail, you cant ban them without breaking half the internet)

jmclnx

9 months ago

No kidding. Where I use to work, certs are a nightmare.

For example, some sites were closed and we asked the site owner to revoke their cert. We got "What does that mean ?", they had lost their private key.

Also other departments had certs that expired, they had no idea what to do. I left over a year ago, and someone who knows more about certs that I do left not long afterwards. I know many certs are due expire soon, good luck to them.

The point of this is I can see 45 day certs being a huge issue for that company. When I left they were looking into non-expiring certs. I have no idea what they ended up doing.

FWIW, this is a fortune 500 company.

ozim

9 months ago

Well with ACME theory is that certs should renew automatically so no one should cate.

But to set it all up in F500 size company, that is totally different discussion and not only TLS certs but all kind of other cert auth that happens there.

rightbyte

9 months ago

> We dont have a really good way of revoking keys after something bad happens.

Why would there be. If the key is 'revokable' that is a weakness in it self.

Arnt

9 months ago

Others have answered on one level. I want to answer on another.

A few older crypto mechanisms were designed around trusting one thing totally. For example, everything's secure until the end of time provided that the user keeps a private key totally private at all times, with no interruption, ever, and if the user lapses then the overall mechanism breaks really badly.

They were complicated mechanisms held together by a screw made of a metal which was assumed to be infinitely strong.

The current fashion is to trust thing in a more limited way, and to design systems such that they won't blow up spectactularly if something breaks. Being able to revoke keys is part of that, it is a weakness that helps to avoid a really bad weakness.

dspillett

9 months ago

> If the key is 'revokable' that is a weakness in it self.

Ish. The threat of that is part of a different risk model, and probably less serious.

A long-lived certificate that ends up being able to be used by a malicious party (perhaps due to a leak of the private key) could be serious for many users if the certificate can't be reliably revoked, which they currently can't be.

A mistaken or malicious revocation if someone were to manage that could be an issue to the service operator (users can't get in) but this is a safer failure than users connecting to a malicious shadow service due, for example, to an accidentally exposed private key and a DNS poisoning attack.

As others have mentioned: if revocation worked better currently, this would be less of an issue.

Dylan16807

9 months ago

A mistaken revocation is orders of magnitude less harmful then a failure to revoke. If revocation worked pretty reliably, that would be an improvement over the status quo.

gruez

9 months ago

>If the key is 'revokable' that is a weakness in it self.

???

Why?

bawolff

9 months ago

> Why would there be. If the key is 'revokable' that is a weakness in it self.

What??

This does not make sense. Keys are revocable in most crypto systems.

olliej

9 months ago

Wait, what is the threat model for revocation being a weakness?

growse

9 months ago

As far as I understand it, two problems:

* Certs come with secrets. Long-lived secrets are riskier than short-lived ones because of window of opportunity if they're compromised in an undetected way.

* Less frequent cert rotations mean that the rotation process is inherently riskier. The old adage of "request a 2-year cert, and you're scheduling an outage 2 years from now" has a lot of truth to it. More frequent rotations increases the incentive to automate, which reduces the service risk.

ndsipa_pomu

9 months ago

Your second point is crucial in my opinion. In most organisations, there'll be a rush to get some new web service configured and an overworked admin is likely to set up the initial certificate. Without a short expiry date, you can almost guarantee that the admin hasn't got around to monitoring, automating or documenting the process and might not even still be working there in 2 years time.

tsimionescu

9 months ago

That's a problem for the company, not the security of the Internet. Why do the PKI people take it upon themselves to increase the problems for these companies in order to force them to automate processes?

fardo

9 months ago

> What is the problem with long lived certs?

Privilege escalation and Dev Ops rot. Long-lived certs often get compromised when privilege escalations happen and someone gets access to an account or computer that has private keys on it.

One example scenario for privilege escalation: let's say a hacker gets access to one of your employee's or vendor's machines and associated accounts using a zero-day, or phishing, or some other method that goes undetected for some time. The attacker, as part of this attack, successfully gets access to your cert's private keys through some way or another without drawing attention to themselves.

Some time later, your firm makes several security updates. When doing this, you unknowingly patched the attacker out of your network. The attacker is now in a race against time if they want to do something with the cert before it expires, and in this kind of situation, the sooner that cert expires, the better, because the attacker gets less time to do something with it. In a perfect world, the cert expired exactly when they got patched out, but because we're not guaranteed to know if there's an attacker in the first place, "keeping the expiration time as short as is reasonably possible without impacting service reliability" is what things seem to be moving towards, to limit the blast radius during access leaks.

As for Dev Ops rot, speed has a tendency to change requirements in favor of automation. Generally, certificate rotations tend to be a pain point - they break management panes, they take down websites, they throw browser errors, they don't get updated in pipelines, and other woes happen when they expire that demand people keep track of a ton of localized knowledge and deadlines that's easy to lose or forget. However, paradoxically, the longer the time between rotations, the more painful they tend to be, because once rotations are sufficiently fast, it becomes unmanageable to do them manually: demanding speed forces people to build anti-fragile rotation systems. Making the requirement be shorter is in some sense an attempt to encode into managerial culture "you need to automate this", as a bulwark against swapping your certs out being anything besides automated or one click rotations.

tikkabhuna

9 months ago

I'm by no means an expert, but the difference between passwords and certs is that certs can be used without any interaction with the authority.

A leaked password will reveal itself to the authority when used. You have to connect to something to use it and when doing so, can be flagged.

A long lived certificate and key can be used with no interaction with the authority, so how do you know that it is being used maliciously? The renewal is the interaction with the authority which could pick up malicious activity, so making it more regular is beneficial.

rightbyte

9 months ago

I think the problem that 100 year certs don't require a complicated SaaS and consultant riddled circus as much.

It is like credit cards. The more problem the more money is to be made by middlemen.

remram

9 months ago

100 year certs require a consultant when the 100 years are up on any certificate and no one has any idea how the system was set up. They require a consultant when there's a security breach and you have to figure out which of the many certs you have ever used is compromised, or let the attackers in.

The hope is that 45 day certs don't require consultants because if you don't set it right you'll find it right away... and of course the risk of leak is much lesser.

ndsipa_pomu

9 months ago

It's very easy to use free certificates (e.g. LetsEncrypt) that can use a free script to automate the renewal of them. There's also plenty of free guides on how to use them for various web servers etc. That comes to a grand total of nothing.

If you'd rather pay someone else to do it for you, then that's your own issue and not really anything to do with the length of certificate validity.

appendix-rock

9 months ago

[flagged]

dang

9 months ago

We've banned this account for repeatedly breaking the site guidelines. Please don't create accounts to break HN's rules with. If you don't want to be banned, you're welcome to email hn@ycombinator.com and give us reason to believe that you'll follow the rules in the future. They're here: https://news.ycombinator.com/newsguidelines.html.

It's particularly bad to do this when you're knowledgeable and (let's assume) correct on a topic, because then the bad parts of your comment (such as personal attacks) end up discrediting the truth. That doesn't help anyone. https://hn.algolia.com/?dateRange=all&page=0&prefix=true&sor...

gruez

9 months ago

>but mere rotation strikes me as similar to password rotation ... which is currently discouraged.

Cargo culting strikes again. Forcing password rotation is bad because it causes people to choose passwords with a given pattern (eg. password1, password2, etc.), which defeats any security benefit. Rotating certificates have no such issue, because the key is (presumably) randomly generated.

gsich

9 months ago

Also you can reuse the same key.

EasyMark

9 months ago

I think it’s the same mentality as “change all your passwords every 6 months”, just a useful principle “change your password if you think you need to” because a ridiculous rule of thumb and hammer slap everything is a nail. A reasonable rule like “update your cert at least once a year” becomes “by extension wouldn’t updating your cert once a month better?”

chippiewill

9 months ago

It's because of the risk of leaked private keys being used for a long period of time.

Additionally, short renewal periods encourages automation which is more secure than a manual process.

Password rotation is discouraged because usually it means that users will create weaker passwords.

gsich

9 months ago

Private keys for certs can and are being reused.

nolist_policy

9 months ago

(Currently) there is no reliable way of revoking compromised certificates.

aestetix

9 months ago

What happened to personal freedom of letting people choose for themselves how long a certificate should last? Not really liking this trend of large companies making decisions for others and then forcing them on everyone.

nickf

9 months ago

I'm not sure how you think certificates work? It's not for 'yourself' - the certificate is an assertion to billions of users worldwide, called relying parties. If you don't care about those, then you can use a private CA. If you do care (and want anyone's browser to work) then it's not a 'personal freedom'.

chippiewill

9 months ago

Anyone can create a certificate with any duration they like. Getting others to trust that certificate is the tricky bit.

These "large companies" put restrictions on what certificate authorities are allowed to do so that they can keep their users safe.

aestetix

9 months ago

Safety at the expense of personal freedom to choose for yourself? What if I do not want the "safety" that these "large companies" claim to provide?

aestetix

9 months ago

I find it interesting that all of the arguments seem to be about the merits of whether pushing this on everyone is good or not, and they all take for granted that personal freedom does not matter anymore.

I dislike not being able to choose my SSL lifetime for the same reason I do not like a web browser deciding for me if I can use my own CA. In both cases choices are being made for me, whether I like them or not.

SahAssar

9 months ago

> I do not like a web browser deciding for me if I can use my own CA

What browser does not allow you to load your own trusted CA?

Y_Y

9 months ago

Big tech paternalism is the worst.

"You can't install that, it might be a virus!"

bananapub

9 months ago

you can do whatever you want, this is about what browsers and SSL cert issuers will agree is reasonable and will indicate to users is "secure".

other decisions they've made on this topic that you can disagree with if you care:

- ciphers

- hashes

- CAs

- revocation systems

etc

remram

9 months ago

You're free to not use CAs. What about their freedom? Or even not use TLS.

And what about the right for users to privacy and security, when there's no drawback on the host other than their misguided sense of "freedom"?

RedShift1

9 months ago

And making ourselves completely dependent on those certificate authorities handing out certs. Dystopian, a couple of mega corps deciding who gets a cert and who doesn't.

bawolff

9 months ago

Nothing is stopping you from using different certificate authorities or one you made yourself. Other than getting other people on board of course.

appendix-rock

9 months ago

Huh? How do you see that this aspect of the PKI has at all changed with this change?

growse

9 months ago

Nothing stopping you running your own CA and issuing your own certs.

Your actual problem is that the browser vendors (who decide which certs should live in the root store) have certain criteria which CAs need to meet in order to be trusted.

Why should Firefox / Chrome / etc. have to honour your desire that your arbitrary-length lifetime certs are trusted by default in their browsers? You still have the personal freedom of installing your own CA root if you like.

foul

9 months ago

The networked environment of today is rapidly phasing-out anything not passing through big bulky systems (most of the time these are for-profit firms). While we wait for the moment one of them (like Let's Encrypt or Sectigo or some BS from FAANGs) will become a SPoF and mess up services anywhere, you can always roll a private CA, use SSH tunnels or SOCKS proxies.

bawolff

9 months ago

Same reason you cant choose the expiry on your passport or drivers license.

aestetix

9 months ago

So large companies are now government agencies?

panki27

9 months ago

I hope Honest Achmed's Used Cars and Certificates (the only CA that matters) will speak out against this.

vbezhenar

9 months ago

Why would he speak out against this? He will be able to sell much more certificates. I bet he lobbied it.

gruez

9 months ago

Or the hassle will push people to use letsencrypt, which is free.

bigfatkitten

9 months ago

This talk of automation is all well and good for systems that are permanently connected to the internet.

Let's say I've got a system on a vessel that will be at sea for two months with unreliable, or no internet connectivity. I want to allow passengers and crew to use this system with their own devices.

What do I do then? Use self signed certs, and just tell users to click through the warnings?

null0pointer

9 months ago

Mixed comments in the github issue. I can definitely see how shorter lifetimes provide better security, but I have also run into my fair share of issues caused by cert expiry. Do we have good data around the lead time between someone’s signing keys being compromised and their use in an attack? The shorter that lead time the less useful this change is.

gruez

9 months ago

>Do we have good data around the lead time between someone’s signing keys being compromised and their use in an attack?

Given how fast it is to set up a phishing proxy, such "lead time" is probably measured in hours rather than days. Even something like a 1 week expiry will provide security benefits.

hulitu

9 months ago

> SSL certificate lifetimes are going down. Dates proposed. 45 days by 2027

45 days ? So much ? Why not expire the next day ?

Y_Y

9 months ago

For extra security I always use already expired certs.

bravetraveler

9 months ago

Show the certs who is boss, revoke them on issuance

systemvoltage

9 months ago

We need more safetyism culture. We need to ban root access completely by 2030. 10-factor security for login. 256 digit OTP and you must insert a drop of blood to login.

At least, we’ll be super secure!

xxs

9 months ago

>drop of blood...

so cool, if there was some startup to give you a full health info with that. Imagine - with your login attempt it comes a proper analysis if you are fit for purpose.

LinuxBender

9 months ago

If we're going this route then maybe drop HTTPS all together, go back to port 80 and instead PGP encrypt each file with a different key and add the cool peoples public keys. This would keep malicious people and bots away from the content.

redrove

9 months ago

Gotta think of the children! Children shouldn't root!

ǝʞoɾ ǝᴉzzo uɐ s,ʇɐɥʇ sǝʎ

Etheryte

9 months ago

Generate a new certificate for your connection for every round trip.

bawolff

9 months ago

You are being downvoted, but it is a reasonable question. If you can renew every 45 days, why not every, say, 3 days?

OSCP stapling except without the oscp stapling part.

hsbauauvhabzb

9 months ago

What does reducing validity actually solve? The same private key is presumably used by all certificates and CSRs - if the private key is compromised then a renewed cert doesn’t solve anything.

Am I missing something here?

chippiewill

9 months ago

> The same private key is presumably used by all certificates and CSRs

That's a choice. Certbot changes the private key with every renewal by default. I suppose in principle CAB might start disallowing key reuse.

Arnavion

9 months ago

You're supposed to use a new private key for the new CSR. There is no reason to reuse the previous key.

spacebanana7

9 months ago

The only thing I can think of is domain expiry. Someone could get a certificate, sell their domain, then continue using the cert until the certificate expires.

ta8645

9 months ago

My tinfoil hat says it's about control. Forcing people to return for another blessing from the central authority, more often. The same reason church is once a week, and not once a year.

olliej

9 months ago

Reasons for short lifetimes:

* there is no robust revocation mechanism, so just minimizing the validity of a compromised cert is the most effective - and technically simple - tool. OCSP is not viable for myriad reasons discussed over the years. OCSP stapling is optional and browsers have to consider it such explicit (opt in) policies.

* extended lifetime means rolling certificates is a complex ceremony that means rapid response is off the table, and can take companies days if not weeks to do.

* following from that: long lived certs also breaks distrust of CAs as they (or site owners) return with “we can’t perform the task we agreed to because we’ll break our customers” (CAs often fail to understand that their primary customers are end users not site owners).

zmmmmm

9 months ago

It would be OK if browsers treated self-signed certificates a little better. There are lots of contexts where a self-signed, long or non-expiring certificate makes perfect sense. But browsers and security stacks in general react as if the whole application is broken, just because they didn't see the certificate before - even when they have no evidence the certificate is malicious. SSH does it nicely, with a prompt on first use and then detecting tampering after - why has this not been adopted for TLS?

ziml77

9 months ago

TOFU is a pretty bad trust model. Even with SSH you're supposed to validate the fingerprint with some already known trusted source. Otherwise you're just assuming that the first time you connect you aren't being MITMed.

greyface-

9 months ago

CAs don't make this problem go away; they just shift it to a central "trusted" party. With the CA model, we're assuming that Let's Encrypt isn't being MITMed.

Spivak

9 months ago

In fact the recommended way to do SSH fingerprint checks is with a CA.

gruez

9 months ago

How does this work when a user is visiting https://bank.example for the first time? Are we supposed to let granny eat the risk of a MITM when she gets a new device? Furthermore, how is such a system supposed to work in private browsing? You either have to introduce a fingerprinting vector (by which certificates are remembered/trusted), or expose users to MITM risk every time.

zmmmmm

9 months ago

I'm not proposing this for everything and high security public facing contexts can definitely do the maintenance to manage frequent certificate rotation.

I just don't want my garage door integration with my car to stop working because its certificate broke. I'd argue these privately deployed single use dedicated certificates are actually better off self-signed and issued on a TOFU basis than using public key infrastructure. It's how bluetooth and many other things work, so why on earth are browsers so bent against it.

ndsipa_pomu

9 months ago

If you want to use self-signed certificates, just load it into the relevant browsers as a trusted cert. Of course, there's issues if you want the general public to just trust a certificate that could have been generated by anyone and possibly fall for a MITM attack.

appendix-rock

9 months ago

OpenSSH does it “nicely” for you maybe. I’ll maybe even accept “for most users of an SSH client”. This behaviour implemented in a browser is utterly unacceptable. The average user is orders of magnitude less technically capable.

You are not the only user of the software that you use.

tsimionescu

9 months ago

Given that certificate issuance is the most vulnerable part of the process (DNS hijacking during the validation process), isn't it a bad idea to encourage renewing certificates so often?

Plus, this is yet another blow to using TLS for networks not connected to the Internet. Asking users to go through some pain of accepting a new self-signed cert every three months, which was already worse than once a year, is going to get almost untenable at 45 days. And no one is offering any realistic alternatives.

nickf

9 months ago

The domain verification process is indeed a weak point - but there's now the upcoming introduction of MPIC (Multi Perspective Issuance Corroboration) to help with that (essentially checking the domain challenges from multiple network perspectives to overcome the risk of BGP-hijacking and similar attacks).

Also, if there's a non-internet connected network or device that uses TLS, it shouldn't be using public/webPKI certificates. Use a private CA, get the root on the managed devices that connect to it, and the problem goes away. That's always been an option.

Dylan16807

9 months ago

> Given that certificate issuance is the most vulnerable part of the process (DNS hijacking during the validation process), isn't it a bad idea to encourage renewing certificates so often?

If someone hijacks your domain they can get a certificate right away, no matter how long the existing certificate was valid for.

> Asking users to go through some pain of accepting a new self-signed cert every three months, which was already worse than once a year, is going to get almost untenable at 45 days.

Are you experiencing the former right now? I thought these policies had no impact on self-signed certs at all.

gruez

9 months ago

>Given that certificate issuance is the most vulnerable part of the process (DNS hijacking during the validation process), isn't it a bad idea to encourage renewing certificates so often?

I don't get it, is the domain extra susceptible to misissuance during the renewal process? If not, I don't see how this is a relevant point.

redrove

9 months ago

Apparently this is coming from Apple, which makes sense considering their stance on security.

I still think more enforcement and standards around IoT SSL are the way to go, with shorter timelines not necessarily more beneficial.

Let's face it, whoever is renewing every 90d is going to be renewing every 45d just fine. It's the devices and companies that use yearly expiries (and still PAY FOR CERTS!) or don't use SSL at all that are the problem.

castillar76

9 months ago

> (and still PAY FOR CERTS!)

People seem to be under the misapprehension that Let's Encrypt / ZeroSSL certificates are "free". They are not — it's that the consumer is not the one paying the bill.

It costs tens to hundreds of thousands of dollars a year just to get the audits required to operate a public CA, much less pay for the infrastructure and staffing required. That bill has to get paid somehow. Yes, pricing on certs in the past has been questionable, but operating a public CA is -not- free, so CAs have sold certificates to pay for that service operation. That has introduced some issues of its own in terms of profit motives, although I would observe that for the majority of public CAs their public TLS certificates are frequently a loss-leader service and not a massive source of income. Put short (too late!), there's nothing wrong with the practice of paying for certificates in and of itself.

What makes me very concerned about the current model funneling everyone to "free" CAs is that those bills are being paid at the moment through donations to ISRG and other organizations. I like that ISRG is making efforts to broaden their donation base to reduce reliance on single sources! However, I'd much prefer to be paying them a monthly subscription fee for their certificate service and not have my ability to leverage it be dependent on the largesse of large corporations that frequently abruptly decide services like this should either cost money or pay up in user data. (Note that I explicitly do not think the user-data thing is happening right now, only that I'm concerned it becomes a problem in the future.)

ndsipa_pomu

9 months ago

One issue with requiring some kind of fee to get SSL certificates is that it acts as a barrier to hobbyists and kids trying to set up a website (probably to learn about the technologies involved). That barrier means that there'll likely be more unsecured websites around which is not desirable.

Maybe some kind of traffic based tax would be better - just have the biggest ISPs pay for all of the free CAs.

xxs

9 months ago

>Apple, which makes sense considering their stance on security.

How does it help? A lot of cert would expire prematurely and the folks will learn to accept expired cert as a norm.

appendix-rock

9 months ago

That is not at all what’s happened with shortened expiry date requirements so far. Industry has proven that it can largely put these systems in place.

Ekaros

9 months ago

I wish there was also some sufficiently long option in use cases where security is somewhat less critical and automatic renewal is much harder. This being devices with web interfaces in local network. Which in some cases might not even have internet connectivity. Getting new cert every 45 days there is real headache...

For public internet yes, shorter is not entirely unreasonable.

ndsipa_pomu

9 months ago

For local services, you can get certificates with CAs that support DNS validation (e.g. LetsEncrypt support that). You'll likely want a DNS provider that has a suitable API so that the e.g. ACME script can post the relevant code to the DNS record, but then you're good to go. A proper public domain name that points at an internal only IP address.

The other benefit of DNS validation is that you don't need to run it on the web server itself (e.g. if it doesn't have internet connectivity), but you can have an ordinary PC/laptop request the certificate and then copy it to where it's needed.

bravetraveler

9 months ago

At that point, I feel self signed is entirely fine. Off the Internet, nobody outside of your control is trying to verify

Ekaros

9 months ago

For machine-to-machine sure. But once browsers start doing this and might even stop self-singed certs... Lot of outdated browsers will be around...

webprofusion

9 months ago

This is largely a solved problem. On Windows https://certifytheweb.com has provided automated certificate management for the best part of a decade and we're now branching out into large scale cross-platform tools, for those interested.

I was surprised by a customer yesterday who was looking to migrate thousands of manually renewed 1 year certs, I had no idea people were still using 1 yr certs to such a broad degree.

indulona

9 months ago

i rather pay money and get a 1y or 2y certificate rather than use those ephemeral let's encrypt ones for free. The overhead of automatization(implementation, maintenance, support, patching, updating...) is not worth it.

KnowtheRopes

9 months ago

Can you get a 2-year certificate now? I thought it was already gone. On the other hand, I love Let's Encrypt, especially when paired with go-acme/lego. It works flawlessly, and I don't need to worry about my certificate expiring or forgetting to renew it each year. I can always monitor my certificates too.

kawsper

9 months ago

I think it is 13-months, at least that is the maximum I can buy here, GoGetSsl have a description and a list here: https://www.gogetssl.com/wiki/general/multi-year-subscriptio...

This seems to have started around August 2020.

So instead they will sell "subscriptions" where you get a new certificate on expiry. So technically they will still sell you multiple years, but as a subscription.

bawolff

9 months ago

Certs longer than 398 days have been banned since sept 2020

indulona

9 months ago

I have not checked for a while, always went for the 1y. But it seem to no longer be the case.

ndsipa_pomu

9 months ago

The overhead of automation? It's one script that can be set to run each day - exactly the kind of thing that is really easy to do with computers.

foul

9 months ago

The only difference between them is liability.

bawolff

9 months ago

CAB rules apply to your fancy paid certs as well.

inthebin

9 months ago

Honestly, why not make it expire after an hour or something? That way you're forced to deal with auto renewal.

ndsipa_pomu

9 months ago

Except that you'll hit an issue with the automated renewal at some point and it'll likely be when you don't have someone available to deal with it - cue several hours of downtime. A problem could occur with the cert issuer and then you've got all of their customers with hours of downtime - not really a good idea.

90 days is a good compromise between encouraging autorenewal and allowing services to be down for a couple of days without really impacting anyone. It's short enough so that the person who set up the automation is probably still employed and thus they have an incentive to fix any issues.

remram

9 months ago

Until it's too short that there's not a single worked day during the alerting period, I think it's fine. 45 days means 15 days between "it didn't renew on schedule" and "anything breaks".

user

9 months ago

[deleted]

user

9 months ago

[deleted]