Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address

Posted on July 3, 2025July 3, 2025 By CWS

Let’s Encrypt, the world’s largest certificates authority, has achieved a big milestone by issuing its first SSL/TLS certificates for an IP deal with on July 1, 2025.

This growth marks a considerable shift within the certificates ecosystem, as IP deal with certificates have traditionally been accessible from solely a handful of certificates authorities on a restricted scale.

The transfer addresses a decade-long demand from customers who’ve repeatedly requested this functionality since Let’s Encrypt started operations in 2015.

The introduction of IP deal with certificates represents a strategic growth of Let’s Encrypt’s service portfolio, complementing their current domain-based certificates choices.

In contrast to conventional area certificates that depend on DNS validation, IP deal with certificates current distinctive technical challenges associated to possession verification and dynamic deal with allocation.

Most Web customers work together with providers by domains like letsencrypt.org reasonably than numerical addresses resembling 54.215.62.21 (IPv4) or 2600:1f1c:446:4900::65 (IPv6), making IP certificates a specialised however essential infrastructure part.

The brand new certificates kind addresses a number of crucial use circumstances inside fashionable Web infrastructure. Internet hosting suppliers can now supply secured default pages when customers by chance entry servers by way of IP addresses, eliminating browser safety warnings.

Moreover, the certificates allow safe DNS over HTTPS (DoH) implementations, permitting DoH servers to authenticate their identities extra successfully to shoppers.

Let’s Encrypt analysts recognized these situations as significantly helpful for cloud infrastructure suppliers managing ephemeral connections between backend servers and Web-of-Issues system producers requiring safe distant entry capabilities.

Technical Implementation and Safety Framework

The technical implementation of IP deal with certificates introduces stringent safety necessities that differ considerably from normal area certificates.

Let’s Encrypt mandates that every one IP deal with certificates have to be short-lived, with validity durations restricted to roughly six days.

This coverage addresses the inherent safety dangers related to IP deal with possession, significantly the dynamic nature of IP allocation by Web service suppliers.

The certificates issuance course of requires ACME shoppers to help the draft ACME Profiles specification and explicitly request the “shortlived” profile.

The validation course of excludes DNS problem strategies, limiting authentication to http-01 and tls-alpn-01 problem varieties.

This limitation ensures that certificates requesters reveal precise management over the IP deal with by HTTP or TLS protocols reasonably than DNS manipulation.

At the moment accessible in staging environments, the service will transition to manufacturing availability later in 2025, coinciding with the overall launch of short-lived certificates performance.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Address, Certificate, Encrypt, Issue, Lets, SSLTLS, Started

Post navigation

Previous Post: Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code
Next Post: AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones

Related Posts

ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email Cyber Security News
Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked Cyber Security News
Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules Cyber Security News
Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins Cyber Security News
Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Cyber Security News
Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News