Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address

Posted on July 3, 2025July 3, 2025 By CWS

Let’s Encrypt, the world’s largest certificates authority, has achieved a big milestone by issuing its first SSL/TLS certificates for an IP deal with on July 1, 2025.

This growth marks a considerable shift within the certificates ecosystem, as IP deal with certificates have traditionally been accessible from solely a handful of certificates authorities on a restricted scale.

The transfer addresses a decade-long demand from customers who’ve repeatedly requested this functionality since Let’s Encrypt started operations in 2015.

The introduction of IP deal with certificates represents a strategic growth of Let’s Encrypt’s service portfolio, complementing their current domain-based certificates choices.

In contrast to conventional area certificates that depend on DNS validation, IP deal with certificates current distinctive technical challenges associated to possession verification and dynamic deal with allocation.

Most Web customers work together with providers by domains like letsencrypt.org reasonably than numerical addresses resembling 54.215.62.21 (IPv4) or 2600:1f1c:446:4900::65 (IPv6), making IP certificates a specialised however essential infrastructure part.

The brand new certificates kind addresses a number of crucial use circumstances inside fashionable Web infrastructure. Internet hosting suppliers can now supply secured default pages when customers by chance entry servers by way of IP addresses, eliminating browser safety warnings.

Moreover, the certificates allow safe DNS over HTTPS (DoH) implementations, permitting DoH servers to authenticate their identities extra successfully to shoppers.

Let’s Encrypt analysts recognized these situations as significantly helpful for cloud infrastructure suppliers managing ephemeral connections between backend servers and Web-of-Issues system producers requiring safe distant entry capabilities.

Technical Implementation and Safety Framework

The technical implementation of IP deal with certificates introduces stringent safety necessities that differ considerably from normal area certificates.

Let’s Encrypt mandates that every one IP deal with certificates have to be short-lived, with validity durations restricted to roughly six days.

This coverage addresses the inherent safety dangers related to IP deal with possession, significantly the dynamic nature of IP allocation by Web service suppliers.

The certificates issuance course of requires ACME shoppers to help the draft ACME Profiles specification and explicitly request the “shortlived” profile.

The validation course of excludes DNS problem strategies, limiting authentication to http-01 and tls-alpn-01 problem varieties.

This limitation ensures that certificates requesters reveal precise management over the IP deal with by HTTP or TLS protocols reasonably than DNS manipulation.

At the moment accessible in staging environments, the service will transition to manufacturing availability later in 2025, coinciding with the overall launch of short-lived certificates performance.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Address, Certificate, Encrypt, Issue, Lets, SSLTLS, Started

Post navigation

Previous Post: Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code
Next Post: AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones

Related Posts

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
Building a Cyber Incident Response Plan That Works Cyber Security News
Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
How to Conduct a Secure Code Review Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News