Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address

Posted on July 3, 2025July 3, 2025 By CWS

Let’s Encrypt, the world’s largest certificates authority, has achieved a big milestone by issuing its first SSL/TLS certificates for an IP deal with on July 1, 2025.

This growth marks a considerable shift within the certificates ecosystem, as IP deal with certificates have traditionally been accessible from solely a handful of certificates authorities on a restricted scale.

The transfer addresses a decade-long demand from customers who’ve repeatedly requested this functionality since Let’s Encrypt started operations in 2015.

The introduction of IP deal with certificates represents a strategic growth of Let’s Encrypt’s service portfolio, complementing their current domain-based certificates choices.

In contrast to conventional area certificates that depend on DNS validation, IP deal with certificates current distinctive technical challenges associated to possession verification and dynamic deal with allocation.

Most Web customers work together with providers by domains like letsencrypt.org reasonably than numerical addresses resembling 54.215.62.21 (IPv4) or 2600:1f1c:446:4900::65 (IPv6), making IP certificates a specialised however essential infrastructure part.

The brand new certificates kind addresses a number of crucial use circumstances inside fashionable Web infrastructure. Internet hosting suppliers can now supply secured default pages when customers by chance entry servers by way of IP addresses, eliminating browser safety warnings.

Moreover, the certificates allow safe DNS over HTTPS (DoH) implementations, permitting DoH servers to authenticate their identities extra successfully to shoppers.

Let’s Encrypt analysts recognized these situations as significantly helpful for cloud infrastructure suppliers managing ephemeral connections between backend servers and Web-of-Issues system producers requiring safe distant entry capabilities.

Technical Implementation and Safety Framework

The technical implementation of IP deal with certificates introduces stringent safety necessities that differ considerably from normal area certificates.

Let’s Encrypt mandates that every one IP deal with certificates have to be short-lived, with validity durations restricted to roughly six days.

This coverage addresses the inherent safety dangers related to IP deal with possession, significantly the dynamic nature of IP allocation by Web service suppliers.

The certificates issuance course of requires ACME shoppers to help the draft ACME Profiles specification and explicitly request the “shortlived” profile.

The validation course of excludes DNS problem strategies, limiting authentication to http-01 and tls-alpn-01 problem varieties.

This limitation ensures that certificates requesters reveal precise management over the IP deal with by HTTP or TLS protocols reasonably than DNS manipulation.

At the moment accessible in staging environments, the service will transition to manufacturing availability later in 2025, coinciding with the overall launch of short-lived certificates performance.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Address, Certificate, Encrypt, Issue, Lets, SSLTLS, Started

Post navigation

Previous Post: Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code
Next Post: AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones

Related Posts

Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
Future of Passwords Biometrics and Passwordless Authentication Cyber Security News
Hackers Allegedly Destroyed Aeroflot Airlines’ IT Infrastructure in Year-Long Attack Cyber Security News
Microsoft Patch Tuesday August 2025 Released Cyber Security News
ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control Cyber Security News
Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News