After reading a blog post about the new Roughtime protocol, I am not convinced of the original premise that shorter certificate lifetimes increase security. The claim is that a shorter time somehow reduces the exposure if a secret key is compromised. But how realistic is that scenario?
If the crypto protocol is weak and that’s how the key was compromised, changing the key for a new equally weak one is meaningless. Conversely, if the protocol is good, an attacker will only be able to compromise the secret key from breaching the system (or by exploiting weak people.) And we know from long experience with breaches that the first thing any attacker does is to open a back door in order to retain access if their originally exploited vulnerability is closed. The amount of time between a breach and the back-dooring process is usually measured in seconds or minutes, which a rotation policy likely won’t help.
We’ve finally begun to accept with passwords that frequent rotation is pointless (and risky). The NIST recommendations are evidence of that shift. Believing in frequent rotations for certificates seems like a superstitious holdover from the 1980s ideas of security.
So I’m asking for evidence. Have there been any studies on the efficacy of short-lived certificates as a security measure? Is there any proof that frequent certificate rotations improve security instead of simply causing frustrating inconveniences (and significant downtime as certificates expire) for all concerned? Another way to ask the question is what are the actual benefits a short certificate rotation period provides?