Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address

Posted on July 3, 2025July 3, 2025 By CWS

Let’s Encrypt, the world’s largest certificates authority, has achieved a big milestone by issuing its first SSL/TLS certificates for an IP deal with on July 1, 2025.

This growth marks a considerable shift within the certificates ecosystem, as IP deal with certificates have traditionally been accessible from solely a handful of certificates authorities on a restricted scale.

The transfer addresses a decade-long demand from customers who’ve repeatedly requested this functionality since Let’s Encrypt started operations in 2015.

The introduction of IP deal with certificates represents a strategic growth of Let’s Encrypt’s service portfolio, complementing their current domain-based certificates choices.

In contrast to conventional area certificates that depend on DNS validation, IP deal with certificates current distinctive technical challenges associated to possession verification and dynamic deal with allocation.

Most Web customers work together with providers by domains like letsencrypt.org reasonably than numerical addresses resembling 54.215.62.21 (IPv4) or 2600:1f1c:446:4900::65 (IPv6), making IP certificates a specialised however essential infrastructure part.

The brand new certificates kind addresses a number of crucial use circumstances inside fashionable Web infrastructure. Internet hosting suppliers can now supply secured default pages when customers by chance entry servers by way of IP addresses, eliminating browser safety warnings.

Moreover, the certificates allow safe DNS over HTTPS (DoH) implementations, permitting DoH servers to authenticate their identities extra successfully to shoppers.

Let’s Encrypt analysts recognized these situations as significantly helpful for cloud infrastructure suppliers managing ephemeral connections between backend servers and Web-of-Issues system producers requiring safe distant entry capabilities.

Technical Implementation and Safety Framework

The technical implementation of IP deal with certificates introduces stringent safety necessities that differ considerably from normal area certificates.

Let’s Encrypt mandates that every one IP deal with certificates have to be short-lived, with validity durations restricted to roughly six days.

This coverage addresses the inherent safety dangers related to IP deal with possession, significantly the dynamic nature of IP allocation by Web service suppliers.

The certificates issuance course of requires ACME shoppers to help the draft ACME Profiles specification and explicitly request the “shortlived” profile.

The validation course of excludes DNS problem strategies, limiting authentication to http-01 and tls-alpn-01 problem varieties.

This limitation ensures that certificates requesters reveal precise management over the IP deal with by HTTP or TLS protocols reasonably than DNS manipulation.

At the moment accessible in staging environments, the service will transition to manufacturing availability later in 2025, coinciding with the overall launch of short-lived certificates performance.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Address, Certificate, Encrypt, Issue, Lets, SSLTLS, Started

Post navigation

Previous Post: Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code
Next Post: AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones

Related Posts

PLA Rapidly Deploys AI Technology Across Military Intelligence Operations Cyber Security News
Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse Cyber Security News
Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News
How to Stay Ahead of Vulnerabilities Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News