Fact-checked by Grok 2 weeks ago

Let's Encrypt

Let's Encrypt is a free, automated, and open (CA) operated by the nonprofit (ISRG) to provide digital certificates enabling for websites worldwide. It issues SSL/TLS certificates at no cost, using the open-standard protocol (RFC 8555) for automated validation, issuance, and renewal, thereby lowering barriers to secure web communication. Founded to promote universal on the , Let's Encrypt adheres to principles of being free, automatic, secure, transparent, open, and cooperative, ensuring certificates are accessible without manual intervention or payment. The project originated from efforts in 2012 to develop a fully automated CA, leading to the incorporation of ISRG on May 24, 2013, specifically to host Let's Encrypt as its flagship initiative. Public announcement occurred on November 18, 2014, with the first certificates issued in the week of September 7, 2015, and general availability following in the week of November 16, 2015. Since launch, Let's Encrypt has driven widespread adoption by eliminating financial and technical hurdles traditionally associated with certificate acquisition, supporting everything from personal blogs to major enterprises. As of January 2025, Let's Encrypt secures over 550 million websites, representing a % growth from the previous year. It holds about 60% market share of all websites whose SSL is known. It issues more than 340,000 certificates per hour, with ongoing infrastructure enhancements—such as scaled rate limits and database optimizations—preparing for over 1 billion active certificates. Funded entirely by donations and sponsorships, the service remains committed to privacy and efficiency, including recent developments like short-lived (six-day) certificates and support introduced in 2025.

Introduction

Overview

Let's Encrypt is a nonprofit-operated Certificate Authority (CA) that provides free TLS/SSL certificates to enable HTTPS encryption for websites worldwide. Operated by the Internet Security Research Group (ISRG), a 501(c)(3) organization dedicated to advancing Internet security, it focuses on removing barriers to secure web connections. By offering these certificates at no cost, Let's Encrypt addresses the expense and complexity that previously hindered widespread adoption of encryption. Central to its model is automation via the protocol, which facilitates domain validation to confirm that certificate requesters control the domains they intend to secure. Standard issued are valid for 90 days, with an opt-in option for shorter six-day validity periods, encouraging regular automated renewals to maintain security without ongoing manual effort. This open-source approach, including the protocol standardized by the IETF, promotes transparency and interoperability to drive universal encryption across the web. In the basic workflow, users deploy open-source client software—such as Certbot—on their servers to request a , complete a validation challenge (like placing a temporary file on the site or updating DNS records), and automatically install the issued , all without human intervention. This streamlined process integrates seamlessly with web servers and hosting environments, making accessible to individuals, small organizations, and large-scale deployments alike.

Mission and Features

Let's Encrypt's core mission is to promote the widespread adoption of across the web, thereby creating a more secure and privacy-respecting internet by providing free, automated digital certificates to website operators. This initiative addresses key barriers to HTTPS deployment, such as the high costs and technical complexities associated with traditional certificate authorities, making encrypted connections accessible to all websites regardless of size or budget. Operated as a nonprofit by the (ISRG), Let's Encrypt adheres to principles of openness and public benefit, eschewing commercial incentives in favor of community-driven development. All of its code, protocols, and specifications are publicly available, including the ACME protocol defined in RFC 8555, which ensures transparency and encourages broad collaboration. This nonprofit structure allows Let's Encrypt to prioritize global internet security over profit, fostering a cooperative ecosystem where improvements benefit the public at large. Among its distinctive features, Let's Encrypt offers automated certificate issuance and renewal, which minimizes in managing TLS/SSL configurations and enables seamless with popular web servers such as and through tools like Certbot. It supports wildcard certificates via the DNS-01 challenge method, allowing a single certificate to secure multiple subdomains under a parent domain, which simplifies management for complex sites. Additionally, standard certificates have short 90-day validity periods, with an opt-in for six-day short-lived certificates to enhance by limiting the impact of potential compromises, and facilitating frequent renewals every 60 days or less for standard certificates (or more often for short-lived ones). In 2025, Let's Encrypt introduced support for certificates as Subject Alternative Names in short-lived profiles, enabling secure TLS connections for IP-based services without requiring domain validation via DNS-01 challenges.

History

Founding and Early Years

The (ISRG) was incorporated on May 24, 2013, as a non-profit aimed at developing digital infrastructure to enhance , particularly by tackling the limited adoption of due to the high costs and complexities of traditional certificate authorities. Founded by Josh Aas, Eric Rescorla, Alex Halderman, and Peter Eckersley, ISRG sought to create an automated system for issuing free SSL/TLS certificates, drawing on expertise from organizations addressing web privacy and security gaps. Backed by initial supporters including the (EFF), Mozilla, Cisco, Akamai, IdenTrust, and the , ISRG positioned Let's Encrypt as a collaborative effort to democratize secure web connections. On November 18, 2014, ISRG publicly announced the Let's Encrypt project, outlining its mission to provide freely available, automated certificates that would simplify HTTPS deployment for websites worldwide and challenge the proprietary models of paid certificate authorities. The initiative emphasized open-source protocols and tools to automate validation and issuance, targeting a launch in mid-2015 to accelerate the encryption of web traffic. This announcement highlighted the project's non-commercial nature, funded through grants and sponsorships, and its commitment to transparency in operations to build community trust. Development progressed through a closed beta phase in 2015, where ISRG tested the Automated Certificate Management Environment () protocol and issuance systems with select participants. The first certificate was issued on September 14, 2015, to the domain helloworld.letsencrypt.org, demonstrating the system's functionality although initial certificates required cross-signing from IdenTrust's established root for browser trust. Public commenced on December 3, 2015, removing invitation requirements and enabling open access to certificate requests. Full general availability, marking the end of the beta period, was achieved on April 12, 2016. One of the primary early challenges was establishing a independent of existing authorities; ISRG submitted its , ISRG Root X1, to major browser and operating system trust stores to gain direct recognition, a process that involved rigorous audits and reviews. Integrating with diverse servers and software ecosystems also required extensive compatibility testing to ensure seamless without disrupting site operations. These efforts laid the groundwork for Let's Encrypt's role in promoting universal during its formative period.

Growth and Milestones

Following its public launch in late 2015, Let's Encrypt experienced rapid early adoption, issuing its millionth on March 8, 2016, which secured approximately 2.4 million domains. By June 28, 2017, the service had issued over 100 million in total, demonstrating significant uptake among website operators seeking free TLS protection. This momentum continued with the addition of support for wildcard on March 13, 2018, enabling single to cover multiple subdomains and simplifying management for complex site architectures. Key milestone events marked sustained expansion, including reaching 100 million active certificates in May 2019, a threshold that underscored the service's role in encrypting a substantial portion of the . In and 2021, Let's Encrypt advanced its cryptographic infrastructure by issuing new intermediate certificates and introducing an ECDSA root (ISRG Root X2) on September 3, , alongside intermediates to enhance efficiency and support modern key types without disrupting existing chains. These updates, including cross-signing for compatibility, facilitated smoother transitions for relying parties while maintaining trust. Scaling infrastructure efforts enabled Let's Encrypt to handle billions of certificates annually, with over 3 billion issued by November 2022 and continued growth supporting more than 309 million domains via 239 million active certificates at that time. The 10th anniversary of Let's Encrypt's first certificate issuance in 2025 prompted reflections on its contributions to HTTPS adoption, noting that encrypted page loads had risen dramatically since 2015, with the service now protecting hundreds of millions of sites globally. Recent milestones include the generation and issuance of new root certificates—ISRG Root YE (ECDSA P-384) and ISRG Root YR (RSA 4096)—on September 3, 2025, as part of a key ceremony to refresh the chain of trust and prepare for future rotations. Additionally, on January 16, 2025, Let's Encrypt announced preparation for short-lived certificates with six-day validity periods, an opt-in feature via ACME profiles to bolster security by reducing exposure windows, alongside support for IP address certificates. Organizational growth at the (ISRG), the nonprofit behind Let's Encrypt, has evolved through diversified funding models relying on sponsorships and donations rather than certificate fees, with founding partners including , the , , Akamai, and the . Ongoing partnerships, such as the 2024 renewal with for research on and revocation, have supported technical advancements, while a broad donor base—including , , and —ensures operational sustainability without compromising the free service model. This structure has allowed ISRG to scale operations, invest in protocol improvements, and maintain independence since its inception in 2013.

Operations

Certificate Issuance Process

The certificate issuance process for Let's Encrypt begins when a domain owner uses an client to generate a public-private key pair for their account, which authenticates the client to the Let's Encrypt API. The client then creates a PKCS#10 Certificate Signing Request (CSR) containing the desired domain names and the public key, signed with the account's private key, and submits it to the Let's Encrypt server via the protocol. To verify domain control, the server issues a that the client must complete, after which the server checks the response from multiple network vantage points to ensure authenticity. Upon successful validation, Let's Encrypt signs the certificate with its intermediate CA key and delivers it to the client. Let's Encrypt then submits the certificate to public logs for monitoring. Let's Encrypt supports several domain validation methods, each suited to different server configurations. The HTTP-01 challenge requires the client to place a specific token file at http://<domain>/.well-known/acme-challenge/<token> on , allowing the Let's Encrypt server to retrieve it via HTTP (with support for up to 10 redirects, but no IP-based redirects). This method is widely used but cannot issue wildcard certificates and fails if is blocked by firewalls. Both HTTP-01 and TLS-ALPN-01 also support validation for IP addresses ( and /64), introduced in 2025, while DNS-01 does not. The DNS-01 challenge involves adding a with a specific token value at _acme-challenge.<domain>, which the server queries via DNS resolution; it supports wildcard certificates and CNAME/NS delegation but may require up to an hour for propagation. The TLS-ALPN-01 challenge, which validates control through a custom TLS (ALPN) extension on port 443 using (), remains active but has limited client support and does not work for wildcards. For historical context, the TLS-SNI-01 challenge was deprecated in March 2019 due to vulnerabilities allowing unauthorized issuance. Certificates issued by Let's Encrypt have a fixed lifetime of 90 days to encourage and rapid if compromised, though an opt-in short-lived option of 6 days is available. Renewal follows the same issuance workflow, with clients typically automating re-issuance around 30 days before expiration to maintain continuous coverage; validation results are cached for up to 30 days, potentially skipping re-validation during renewal if unchanged. Clients are advised to schedule renewals at randomized intervals to distribute load evenly across Let's Encrypt's infrastructure. Common errors during issuance often stem from misconfigured validation challenges, such as firewalls blocking for HTTP-01 attempts or DNS propagation delays in DNS-01 setups, which can be troubleshot by verifying network accessibility from external vantage points and using the staging environment for testing. Another frequent issue is cached authorizations preventing expected re-validation, resolvable by forcing a new or waiting out the 30-day cache period. For seamless integration, tools like Certbot—recommended by Let's Encrypt—automate the entire process, including key generation, challenge completion, installation on web servers like or , and scheduled renewals via jobs or timers. For example, running certbot --nginx on a server with prompts domain selection, handles HTTP-01 validation, and configures the server to use the new certificate while setting up automatic renewal. Other ACME clients, such as acme.sh or , offer similar functionality for custom environments.

Policies and Rate Limits

Let's Encrypt operates under a set of core policies designed to ensure secure and responsible use of its certificates. The service issues certificates exclusively, verifying control over domain names through technical methods without providing Organization Validation (OV) or Extended Validation (EV) options. Certificates are available only for names and public IP addresses ( or /64 ranges), requiring subscribers to be the legitimate registrant, assignee, or authorized agent of the identifiers in the certificate request. Additionally, the Subscriber Agreement prohibits using certificates for illegal activities, including , , distribution, or facilitating man-in-the-middle attacks to intercept encrypted communications. To prevent abuse and maintain service sustainability, Let's Encrypt enforces strict rate limits on certificate issuance and related operations. As of June 2025, key limits include up to 50 new certificates per registered (defined by the eTLD+1, such as example.co.uk), per IPv4 address, or per IPv6 /64 range every 7 days, and 300 new orders per account every 3 hours. A separate limit of 5 duplicate certificates per exact set of identifiers applies every 7 days to discourage unnecessary reissuances. These limits use a algorithm for enforcement, with no resets for revoked certificates, and overrides are available for some via a formal request process. In response to rapid growth, Let's Encrypt evolved its rate limiting infrastructure on January 30, 2025, implementing a system based on for storage and the (GCRA) for flow management. This upgrade supports scaling to over 1 billion active certificates by reducing database load by 80% and authorization reads by over 99%, addressing a 42% yearly increase in protected websites from over 550 million (as of January 2025). The changes maintain existing per-domain limits while enabling smoother handling of high-volume requests. Subscribers are encouraged to use the staging environment for testing ACME clients and issuance processes, which features higher rate limits—such as 10 new registrations per every 3 hours—to avoid impacting production quotas. Enforcement includes automated detection of duplicate requests and temporary suspensions for repeated violations, such as exceeding per-domain limits, which can result in issuance bans until the limit window refills. Misuse reports, including potential policy breaches, can be submitted to [email protected] for investigation and possible revocation.

Technology

ACME Protocol

The Automated Certificate Management Environment () protocol facilitates automated issuance, renewal, and revocation of certificates between client software and a (CA) server, such as Let's Encrypt, through a client-server interaction over using messages secured by JSON Web Signatures (JWS). Defined in RFC 8555 published in March 2019, ACME version 2 (v2) standardizes this process, while the earlier ACME v1, based on draft specifications, has been deprecated by Let's Encrypt since June 2021 to encourage adoption of the more robust v2. The protocol supports the full certificate lifecycle, enabling clients to register accounts, request orders for specific domain identifiers, prove control over those identifiers via challenges, submit certificate signing requests (CSRs), and retrieve issued certificates, all while maintaining security through cryptographic proofs. In 2025, Let's Encrypt introduced support for Profiles as an extension to RFC 8555, allowing clients to negotiate specific features such as short-lived certificates during the order process. This enables issuance of certificates with reduced lifetimes, such as six days, to enhance by minimizing exposure windows while maintaining . Short-lived certificates are requested via profile negotiation in the newOrder request, with general availability targeted by late 2025. Key components of ACME include account registration, where a client creates an with the server by submitting a signed newAccount request containing a JSON Web (JWK) public key, optional contact information, and agreement to the server's . For security, the server provides a unique nonce value in HTTP headers with each response, which the client must include in the JWS header of subsequent requests to prevent replay attacks. Directory discovery allows clients to locate endpoints by fetching a directory resource from the server's well-known , which lists URLs for resources like newAccount, newOrder, and newNonce. Order objects, created via a newOrder request, represent pending requests and include an array of identifiers (e.g., domain names) along with and finalization URLs provided by the . The challenge-response mechanism verifies the client's control over a domain without relying on pre-existing trust, using methods like HTTP-01, DNS-01, and TLS-ALPN-01. In the HTTP-01 challenge, the server provides a token, and the client must host a resource at https://<domain>/.well-known/acme-challenge/<token> containing the key authorization string, formed as <token>.<thumbprint>, where the thumbprint is the base64url-encoded SHA-256 digest of the account's JWK per RFC 7638. The server then fetches this resource and computes the expected key authorization to validate it. For DNS-01, the client adds a TXT DNS record at _acme-challenge.<domain> with the base64url-encoded SHA-256 digest of the key authorization string, allowing wildcard domain validation (e.g., *.example.com), which is not supported by HTTP-01 or TLS-ALPN-01. TLS-ALPN-01 involves the client serving a self-signed TLS certificate during a TLS handshake over Application-Layer Protocol Negotiation (ALPN) with the ACME protocol identifier, embedding the key authorization in the certificate's extensions for server validation. Upon successful challenge completion for all identifiers in an order, the client submits a CSR via a finalize request, after which the server issues and provides the certificate download URL. Security features in rely on and JWS standards to sign all client requests with the account's private key, ensuring and without transmitting private keys to the . Anti-replay protection is enforced by requiring a fresh from the in each JWS, which is single-use and time-bound to mitigate man-in-the-middle attacks. is integrated at the level, where excessive requests (e.g., for new accounts or orders) trigger a rateLimited error response with details on exceeded limits, helping prevent abuse and denial-of-service attempts. ACME extensions include support for wildcard certificates exclusively through DNS-01 challenges, revocation requests via a signed revokeCert message to the CA using the certificate's or encoded body, and key rollover through a keyChange request that allows updating an account's pair while authorizing the transition with the old . These features enable flexible management while adhering to the protocol's core security model.

Chain of Trust

The for Let's Encrypt certificates is established through a of root and intermediate certificates issued by the (ISRG), ensuring validation by relying parties such as web browsers and operating systems. The primary root certificates are ISRG Root X1, an 4096-bit key generated on June 4, 2015, and valid until June 4, 2030, and ISRG Root X2, an ECDSA key generated on September 4, 2020, and valid until September 4, 2035. These roots form the foundation, with newer roots ISRG Root YE (ECDSA , generated September 3, 2025) and ISRG Root YR ( 4096, generated September 3, 2025) prepared for future use but not yet widely trusted in major root programs. Current active intermediate certificates include the ECDSA-based E7 and E8, both valid until March 12, 2027, and signed by ISRG Root X2, as well as the -based R12 and R13, also valid until March 12, 2027, and signed by ISRG Root X1. Historical intermediates such as E1 and E2 (ECDSA) and R3 and R4 () have expired, with E1 and E2 reaching end-of-life on September 15, 2025. These intermediates are used to sign end-entity subscriber certificates, creating chains that trace back to a trusted root for verification. Cross-signing has been employed to enhance compatibility during transitions. Historically, ISRG Root X1 was cross-signed by the DST Root CA X3 from , which was retired in , allowing broader initial trust adoption. ISRG Root X2 was cross-signed by ISRG Root X1 to support systems not yet trusting X2 directly. Due to the impending expiration of the DST Root CA X3 cross-signature on September 30, 2024, Let's Encrypt announced in June 2024 the discontinuation of cross-signed chains, shifting to direct chains from ISRG roots to improve efficiency and reduce chain length. For chain building, RSA-based end-entity certificates typically chain to ISRG Root X1 via R12 or R13 for maximum with older devices that may not support ECDSA . ECDSA-based certificates chain via E7 or E8 to either ISRG Root X1 (for broad ) or ISRG Root X2 (for smaller chains and better performance on modern systems). This flexibility addresses varying support levels, such as legacy versions below 7.1 that require the X1 chain. Trust distribution involves submitting root certificates to major programs for inclusion in trust stores, including those of , Apple, , , and others, achieving full inclusion by . ISRG roots are identified via specific object identifiers (OIDs), such as 1.3.6.1.4.1.57264 for the ISRG root CA, embedded in certificates to facilitate automated recognition and validation.

Supporting Services

Let's Encrypt provides several ancillary services to support certificate validation, monitoring, and management, ensuring reliable operation of its automated certificate issuance system. These services include tools for transparency, revocation checking, user notifications, access, and underlying infrastructure, all designed to enhance security and usability without compromising privacy or performance. One key supporting service is the (CT) logging system, which promotes public monitoring of certificate issuance to detect mis-issuance. Let's Encrypt operated RFC 6962-compliant CT logs, but these will go read-only on November 30, 2025, and will be fully shut down on February 28, 2026, to align with evolving standards. The planned transition will shift operations to Static CT logs, which maintain compliance with modern CT requirements while reducing maintenance overhead. This change ensures continued transparency for certificates issued after the shutdown, allowing relying parties to verify issuance without relying on legacy logs. For certificate revocation, Let's Encrypt previously offered an (OCSP) service to check revocation status in real-time. Announced in December 2024, the OCSP service reached end-of-life on August 6, 2025, due to concerns and the low utility of revocation in short-lived certificates. Following the shutdown, the service recommends shifting to Certificate Revocation Lists (CRLs) and , where servers include revocation information directly in TLS handshakes to maintain efficiency and . To assist users with certificate lifecycle management, Let's Encrypt provided expiration notification emails, alerting subscribers to upcoming renewals. This ceased on June 4, 2025, as automation tools like clients have become prevalent, reducing the need for manual reminders. The discontinuation encourages reliance on automated renewal processes, aligning with the goal of seamless deployment while addressing privacy issues from storing email addresses. API environments facilitate development and production use of Let's Encrypt services. The production ACME endpoint, acme-v02.api.letsencrypt.org, handles live certificate issuance with strict rate limits to prevent abuse. In contrast, the staging environment at acme-staging-v02.api.letsencrypt.org offers higher rate limits for testing and , allowing developers to simulate issuance without impacting production quotas. For monitoring and searching issued certificates, tools like provide public access to CT log data, enabling users to query Let's Encrypt certificates by domain or . Underpinning these services is the software, an open-source ACME-based implemented in Go, which powers Let's Encrypt's core issuance and validation processes. ensures through distributed deployment, supporting the scale of millions of daily certificate requests.

Adoption and Impact

Usage Statistics

As of January 2025, Let's Encrypt provides active TLS certificates to over 550 million websites, a figure that reflects a 42% year-over-year growth and underscores its rapid expansion in securing . Let's Encrypt commands a dominant position in the SSL certificate market, accounting for 63.8% of all certificates among public certificate authorities as of November , far ahead of competitors like at 22.4%. The service has demonstrated exponential issuance trends since its launch, reaching its first million certificates within months of public beta in early 2016 and scaling to billions issued cumulatively by , with over 3 billion certificates issued annually in recent years to support ongoing renewals and new deployments. Adoption is particularly strong among high-profile sites, with Let's Encrypt securing about 45% of the top 1 million websites as measured in 2024 data that remains indicative into 2025; it is also widely utilized by open-source projects through integrated tools like Certbot and by small businesses seeking cost-free automation for enablement. Globally, Let's Encrypt's usage is concentrated in regions with robust web infrastructure, led by (particularly the at around 45% of its customer base) and (including the and at over 9% each), aligning with patterns of high web hosting density.

Contributions to Web Security

Let's Encrypt has significantly accelerated the global adoption of , transforming it from a niche security practice to a standard for web communications. Prior to its launch in 2015, only about 39% of web pages loaded over on desktop browsers, limited by the cost and complexity of obtaining certificates from traditional authorities. By providing free, automated certificates, Let's Encrypt addressed these barriers, contributing to a dramatic rise in usage; by January 2025, over 92% of top-level connections in were secured with , with Let's Encrypt securing over 550 million websites worldwide. The initiative's ecosystem benefits extend beyond its own operations, as the Automated Certificate Management Environment () protocol it pioneered has become an IETF standard ( 8555) widely adopted by other certificate authorities, enabling automated issuance and renewal across the industry. This standardization has facilitated broader encryption deployment, reducing the prevalence of man-in-the-middle attacks by ensuring more web traffic is encrypted end-to-end, thereby protecting users from interception on untrusted networks. Let's Encrypt's ongoing contributions to IETF working groups, including the development of ACME Renewal Information ( 9773), further solidify its role in evolving secure management protocols. In addition to technical advancements, Let's Encrypt has fostered educational impact through comprehensive documentation and community resources that promote security best practices, such as integrating () preloading to enforce and mitigate downgrade attacks. These materials guide website operators in configuring HSTS headers alongside automated certificate renewal, enhancing protection against protocol weakening exploits. On a broader scale, Let's Encrypt has diminished reliance on expensive paid certificate authorities, democratizing access to for non-profits, small businesses, and individuals who previously could not afford it, thereby promoting a more equitable secure web. This shift has empowered diverse users to implement without financial hurdles, contributing to higher overall resilience. Let's Encrypt also advances through features like short lifetimes—now including six-day options introduced in —which minimize the exposure window if a private key is compromised, reducing the need for and complexity of processes. Furthermore, its automation tools encourage the adoption of modern ciphers and TLS configurations in deployment guides, steering users toward stronger cryptographic standards like ECDHE for .

Challenges and Future Directions

Known Issues and Criticisms

One significant criticism of Let's Encrypt stems from its reliance on for certificate issuance, which verifies only domain control and not the legitimacy or content of the associated website. This has enabled malicious actors to obtain valid certificates for sites, creating a of "false " among users who may trust the icon without scrutinizing the site's authenticity. For instance, in 2017, Let's Encrypt issued nearly 15,000 certificates containing "" for fraudulent domains, and reports indicate that DV certificates from Let's Encrypt and similar authorities accounted for 96% of SSL-enabled sites observed in scans. Compatibility challenges have also arisen, particularly with older devices lacking updated trust stores. Devices running 7.0 and earlier versions experienced issues trusting Let's Encrypt's (ISRG Root X1) until a cross-sign with the deprecated DST Root CA X3 was implemented in 2020, providing temporary compatibility through September 2024. Additionally, some older versions have bugs with ECDSA-based chains using P-384 curves, leading to validation failures despite the root being trusted. The 90-day certificate lifetime, while promoting through frequent key rotation, introduces operational risks tied to automation. Administrators must rely on automated renewal processes, which can fail due to misconfigurations, network issues, or software bugs, potentially leaving sites exposed during lapses. Critics argue this increases server load from repeated issuances and heightens the chance of errors in high-traffic environments, where even brief from failed renewals can disrupt services. Past security vulnerabilities in validation methods have drawn scrutiny. The tls-sni-01 challenge, used for validation, was deprecated in March 2019 after a 2018 exploit allowed attackers to obtain certificates for domains they did not control by leveraging misconfigured shared hosting environments. Isolated incidents of challenge hijacking have also occurred through remote vulnerabilities, enabling unauthorized certificate issuance without direct domain compromise. Other critiques highlight Let's Encrypt's operational dependencies and limitations. As a nonprofit, it relies heavily on donations and grants, with an estimated 2025 budget of $4.5 million to cover and staffing for over 500 million websites. Furthermore, its exclusive focus on certificates excludes options for Organization Validation (OV) or Extended Validation (), which provide additional identity assurances preferred by some enterprises for high-security applications.

Upcoming Developments

Let's Encrypt plans to introduce support for short-lived certificates by the end of 2025, allowing clients that implement profile selection to request certificates with a six-day lifetime, thereby reducing the window for potential compromises without relying on mechanisms. This feature will initially launch with limited issuance, with the first such certificate already issued in February 2025, and aims to enhance security for automated renewals by minimizing exposure time. Subscribers can currently opt in via profiles. In conjunction with short-lived certificates, Let's Encrypt announced support for IP address certificates on January 16, 2025, enabling validation and issuance for IP-based connections without requiring domain names in the Subject Alternative Names. This capability, tested with the first IP address certificate issued in July 2025, will become generally available later in the year, facilitating secure TLS for non-domain resources like direct IP endpoints. To ensure long-term , Let's Encrypt completed the generation of new certificates ISRG YE (ECDSA P-384) and ISRG YR (RSA 4096) on September 3, 2025, along with associated intermediates YE1 through YE3 and YR1 through YR3. These , cross-signed by existing ISRG X1 and X2, are slated for submission to root program stores in the coming months, with activation planned to extend the chain of beyond 2030 as older approach expiration. Service evolutions include a full transition to Static CT API logs after 2026, with legacy 6962 logs entering read-only mode on November 30, 2025, and shutting down entirely on February 28, 2026, to improve efficiency and reliability in monitoring. In August 2025, Let's Encrypt discontinued its OCSP service to enhance privacy by avoiding exposure of client addresses, requiring clients to use CRLs or other methods. This shift supports enhanced automation in the protocol, potentially allowing for tailored certificate lifetimes in specific scenarios while maintaining core short-duration defaults. Strategically, Let's Encrypt is scaling infrastructure to handle growth toward 1 billion active certificates, building on its history of issuing over billion total certificates by 2022, with increased research into to future-proof the web PKI against emerging threats.

References

  1. [1]
    About Let's Encrypt
    Feb 12, 2021 · Let's Encrypt is a free, automated, and open Certificate Authority brought to you by the nonprofit Internet Security Research Group (ISRG). ...
  2. [2]
    About Internet Security Research Group
    ISRG was founded in May of 2013 to serve as a home for public-benefit digital infrastructure projects, the first of which was the Let's Encrypt Certificate ...
  3. [3]
    Updated Let's Encrypt Launch Schedule
    Aug 7, 2015 · First certificate: Week of September 7, 2015; General availability: Week of November 16, 2015. In the ten weeks between these two dates we'll ...
  4. [4]
    [PDF] 2024 Annual Report - Internet Security Research Group
    Let's Encrypt has revolutionized web security by providing free, automated, and open certificates, now serving half a billion domains. This monumental ...
  5. [5]
    Scaling Our Rate Limits to Prepare for a Billion Active Certificates
    Jan 30, 2025 · Let's Encrypt protects a vast portion of the Web by providing TLS certificates to over 550 million websites—a figure that has grown by 42% ...Missing: credible sources
  6. [6]
    Announcing Six Day and IP Address Certificate Options in 2025
    Jan 16, 2025 · We hope to make short-lived certificates generally available by the end of 2025. The earliest short-lived certificates we issue may not support ...<|control11|><|separator|>
  7. [7]
    Let's Encrypt
    Let's Encrypt is a free, automated, and open Certificate Authority brought to you by the nonprofit Internet Security Research Group (ISRG).Getting Started · How It Works · Encryption for Everybody · About Us
  8. [8]
    FAQ - Let's Encrypt
    Apr 28, 2025 · Let's Encrypt is a global Certificate Authority (CA). We let people and organizations around the world obtain, renew, and manage SSL/TLS certificates.
  9. [9]
    How It Works - Let's Encrypt
    Aug 2, 2025 · Let's Encrypt is a free, automated, and open certificate authority brought to you by the nonprofit Internet Security Research Group (ISRG).
  10. [10]
  11. [11]
    Getting Started - Let's Encrypt
    Jan 23, 2025 · Let's Encrypt is a free, automated, and open certificate authority brought to you by the nonprofit Internet Security Research Group (ISRG).
  12. [12]
    [PDF] 2023 Annual Report - Internet Security Research Group
    MAY 24, 2013: ISRG is incorporated, intending to build Let's Encrypt. NOVEMBER 18, 2014: Let's Encrypt is announced publicly. SEPTEMBER 14, 2015: Let's ...
  13. [13]
    Celebrating 10 Years of Building a Better Internet
    ISRG was founded in May of 2013 by Josh Aas and Eric Rescorla as a home for public benefit digital infrastructure. Josh and Eric were later joined by Alex ...Missing: incorporation backers
  14. [14]
    Let's Encrypt for a safer web | Electronic Frontier Foundation
    Nov 13, 2024 · EFF is pleased to announce Let's Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, IdenTrust, and ...
  15. [15]
    Let's Encrypt: Delivering SSL/TLS Everywhere
    Let's Encrypt: Delivering SSL/TLS Everywhere. By Josh Aas, ISRG Executive Director · November 18, 2014. Vital personal and business information flows over ...
  16. [16]
    Let's Encrypt Launch Schedule
    Jun 16, 2015 · Let's Encrypt has reached a point where we're ready to announce our launch schedule. First certificate: Week of July 27, 2015; General ...Missing: date | Show results with:date
  17. [17]
    Our First Certificate Is Now Live - Let's Encrypt
    Sep 14, 2015 · Let's Encrypt passed another major milestone by issuing our first certificate. You can see it in action here. Our cross signature is not yet ...Missing: testing | Show results with:testing
  18. [18]
    Entering Public Beta - Let's Encrypt
    Dec 3, 2015 · We're happy to announce that Let's Encrypt has entered Public Beta. Invitations are no longer needed in order to get free certificates from ...Missing: testing first
  19. [19]
    Our Millionth Certificate - Let's Encrypt
    Mar 8, 2016 · Let's Encrypt has issued its millionth certificate. Our first million certificates are helping to secure approximately 2.4 million domains.
  20. [20]
    Milestone: 100 Million Certificates Issued - Let's Encrypt
    Jun 28, 2017 · Let's Encrypt has reached a milestone: we've now issued more than 100,000,000 certificates. This number reflects at least a few things:.Missing: history | Show results with:history
  21. [21]
    [PDF] 2019 ANNUAL REPORT - Internet Security Research Group
    “When Let's Encrypt started, the only available client was the official Let's Encrypt client [now CertBot]. ... a milestone of 100 million active certificates the ...<|control11|><|separator|>
  22. [22]
    Let's Encrypt's New Root and Intermediate Certificates
    Sep 17, 2020 · On Thursday, September 3rd, 2020, Let's Encrypt issued six new certificates: one root, four intermediates, and one cross-sign.The Backstory · Why We Issued An Ecdsa Root... · Why We Cross-Signed The...
  23. [23]
    Let's Encrypt issued over 3 billion certificates, securing 309M sites ...
    Nov 29, 2022 · Starting with August 2018, Let's Encrypt has been directly trusted by all major browsers and operating systems and all major root certificate ...
  24. [24]
    Encryption for Everybody
    Feb 14, 2025 · 2025 marks ten years of Let's Encrypt. Already this year we've taken steps to continue to deliver on our values of user privacy, efficiency, ...
  25. [25]
    New "Y" Root and Intermediate Hierarchy - API Announcements
    Sep 4, 2025 · We have completed our key ceremony resulting in the issuance of two new root certificates (ISRG Root YE and Root YR) and six new ...
  26. [26]
    Let's Encrypt Continues Partnership with Princeton to Bolster ...
    May 30, 2024 · Let's Encrypt is a free, automated, and open Certificate Authority brought to you by the nonprofit Internet Security Research Group (ISRG). Read ...
  27. [27]
    Sponsors and Donors - Internet Security Research Group
    Read all about our nonprofit work this year in our 2024 Annual Report. Subscribe for email updates about ISRG and our projects. Email. Brighter Bytes: the ...<|separator|>
  28. [28]
    Challenge Types - Let's Encrypt
    Jan 7, 2025 · After Let's Encrypt gives your ACME client a token, your client will create a TXT record derived from that token and your account key, and put ...DNS providers who easily... · Čeština · Català · Greek
  29. [29]
    Rate Limits - Let's Encrypt
    Up to 50 certificates can be issued per registered domain (or IPv4 address, or IPv6 /64 range) every 7 days. This is a global limit, and all new ...
  30. [30]
    [PDF] Version 1.6 18 August 2025 Page 1 of 8 Let's Encrypt Subscriber ...
    Aug 18, 2025 · This Subscriber Agreement (“Agreement”) is a legally binding contract between you and, if applicable, the company, organization or other ...
  31. [31]
    Staging Environment - Let's Encrypt
    May 12, 2025 · Rate Limits · The New Registrations per IP Address limit is 50 per 3 hours. · The New Registrations per IPv6 Range limit is 500 per 3 hours (the ...Staging endpoint for ACME v2 · Čeština · Català · Italiano
  32. [32]
    Suspended certificate - Help - Let's Encrypt Community Support
    Jan 10, 2025 · My certificate is returning as suspended, I have tried several times to return it, but it doesn't work, what can I do?
  33. [33]
    Policy and Legal Repository - Let's Encrypt
    Let's Encrypt is a free, automated, and open certificate authority brought to you by the nonprofit Internet Security Research Group (ISRG).Missing: funding models partnerships
  34. [34]
  35. [35]
    End of Life Plan for ACMEv1 - Let's Encrypt Community Support
    Mar 11, 2019 · We are announcing an end of life plan for ACMEv1. In November of 2019 we will stop allowing new account registrations through our ACMEv1 API endpoint.
  36. [36]
  37. [37]
  38. [38]
  39. [39]
  40. [40]
  41. [41]
  42. [42]
  43. [43]
  44. [44]
  45. [45]
  46. [46]
  47. [47]
  48. [48]
  49. [49]
  50. [50]
  51. [51]
    Chains of Trust - Let's Encrypt
    This page describes all of the current and relevant historical Certification Authorities operated by Let's Encrypt.
  52. [52]
    DST Root CA X3 Expiration (September 2021) - Let's Encrypt
    Sep 30, 2021 · To make sure the certificates we issue are trusted on older devices, we also have a “cross-signature” from an older root certificate: DST Root ...Italiano · Català · 繁體中文 · Čeština
  53. [53]
  54. [54]
    Certificate Compatibility - Let's Encrypt
    Jan 19, 2025 · Both of these roots have been included in platform trust stores for several years now (ISRG Root X1 since late 2016, ISRG Root X2 since mid 2022) ...Platforms that trust ISRG Root X1 · Türkçe · Català · GreekMissing: submission | Show results with:submission
  55. [55]
  56. [56]
    Documentation - Let's Encrypt
    Let's Encrypt is a free, automated, and open certificate authority brought to you by the nonprofit Internet Security Research Group (ISRG).
  57. [57]
    End of Life Plan for RFC 6962 Certificate Transparency Logs
    Aug 14, 2025 · On February 28, 2026, we will entirely shut down our RFC 6962 logs. End users (consumers or relying parties) of Web PKI certificates do not need ...
  58. [58]
    Blog - Let's Encrypt
    Let's Encrypt is a free, automated, and open Certificate Authority brought to you by the nonprofit Internet Security Research Group (ISRG).
  59. [59]
    Certificate Transparency (CT) Logs - Let's Encrypt
    Aug 27, 2025 · Let's Encrypt has created an open-source CT log monitoring tool called CT Woodpecker. We use this tool to monitor the stability and compliance of our own logs.Thai · Italiano · Català · Čeština
  60. [60]
    Ending OCSP Support in 2025 - Let's Encrypt
    Dec 5, 2024 · January 30, 2025. OCSP Must-Staple requests will fail, unless the requesting account has previously issued a certificate containing the OCSP ...
  61. [61]
    OCSP Service Has Reached End of Life - Let's Encrypt
    By Josh Aas · August 6, 2025. Today we turned off our Online Certificate Status Protocol (OCSP) service, as announced in December of last year.
  62. [62]
    Ending Support for Expiration Notification Emails - Let's Encrypt
    Jan 22, 2025 · We will be ending this service on June 4, 2025. The decision to end this service is the result of the following factors: Over the past 10 years ...Missing: policies | Show results with:policies<|separator|>
  63. [63]
    Expiration Notification Service Has Ended - Let's Encrypt
    Jun 26, 2025 · This service ended on June 4, 2025. The decision to end the service is the result of the following factors: Over the past 10 years more and more ...
  64. [64]
    Crt.sh
    No information is available for this page. · Learn why
  65. [65]
    letsencrypt/boulder: An ACME-based certificate authority, written in Go.
    The ACME protocol allows the CA to automatically verify that an applicant for a certificate actually controls an identifier, and allows subscribers to issue and ...
  66. [66]
    Usage statistics and market share of Let's Encrypt as SSL certificate ...
    Let's Encrypt is used as SSL certificate authority by 63.8% of all the websites whose SSL certificate authority we know. This is 60.3% of all websites.
  67. [67]
    SSL/TLS Certificate Statistics and Trends for 2025 - Network Solutions
    Jun 20, 2025 · One of them, Let's Encrypt, leads by a huge margin with 63.7% of market share. GlobalSign comes in second with 22.4% and third, Sectigo, with ...
  68. [68]
    Let's Encrypt Has Issued its First Million Certificates
    At 9:04am GMT today, the Let's Encrypt Certificate Authority issued its millionth ... March 8, 2016. Let's Encrypt Has Issued its First Million Certificates.
  69. [69]
    SSL Statistics & Trends Shaping Web Security in 2025
    Jul 23, 2025 · 2024: As of 2024, Let's Encrypt is estimated to have issued over 3 billion SSL certificates, covering over 45% of the top 1 million websites ...<|control11|><|separator|>
  70. [70]
    Integration Guide - Let's Encrypt
    Jun 23, 2025 · This document contains helpful advice if you are a hosting provider or large website integrating Let's Encrypt, or you are writing client software for Let's ...
  71. [71]
    Let's Encrypt - Market Share, Competitor Insights in SSL Certificate
    44.74% of Let's Encrypt customers are from the United States. Other top countries using Let's Encrypt are United Kingdom and France with 70(9.21%) and 69(9.08%) ...
  72. [72]
    HTTPS encryption on the web - Google Transparency Report
    Percentage of pages loaded over HTTPS in Chrome by platform ; Mar 14, 2015, 39%, 29% ; Mar 21, 2015, 39%, 29% ; Mar 28, 2015, 39%, 30% ; Apr 4, 2015, 39%, 30% ...
  73. [73]
    [PDF] The State of https Adoption on the Web | Mozilla Research
    Let's Encrypt was the first global Certificate. Authority (CA) service that allowed website owners to au- tomatically obtain free browser-trusted certificates, ...Missing: impact | Show results with:impact
  74. [74]
    What Is the ACME Protocol? - SSL.com
    Nov 14, 2024 · Developed to streamline the entire process, ACME has been widely adopted by many Certificate Authorities (CAs) and has become an internet ...
  75. [75]
    95% of HTTPS servers vulnerable to trivial MITM attacks - Netcraft
    Mar 16, 2016 · With companies like Let's Encrypt offering free certificates and automated management tools, it is also easier than ever to deploy an HTTPS ...Http Strict Transport... · Implementing Hsts: A Simple... · Hsts PreloadingMissing: impact reducing
  76. [76]
    ACME Renewal Information (ARI) Published as RFC 9773
    Sep 16, 2025 · Let's Encrypt has been proud to work with the IETF to maintain ACME as an open standard since we first developed the technology a decade ago.
  77. [77]
    HSTS and Let's Encrypt - Web Performance Consulting - Tim Kadlec
    Jan 4, 2016 · HTTP Strict Transport Security (HSTS) helps to fix this problem by telling the browser that it should never request content from your site using HTTP.Missing: educational resources
  78. [78]
    How Let's Encrypt made the internet safer and HTTPS standard
    Jul 7, 2025 · Over the last ten years, more than 600 million websites have been secured with free certificates from Let's Encrypt. Here's how it all began and why.
  79. [79]
    Case Study: Let's Encrypt | Linux Foundation
    Today, Let's Encrypt serves 225+ million websites, issuing ~1.5 million certificates each day on average. HTTPS adoption has grown to 84% globally and it's ...Missing: top 1
  80. [80]
  81. [81]
    Let's Encrypt Issues 15000 Fraudulent "PayPal" Certificates Used for ...
    Mar 27, 2017 · Free and open Certificate Authority (CA) Let's Encrypt has issued nearly 15,000 certificates containing the term “PayPal” for phishing sites ...
  82. [82]
    Let's Encrypt and Comodo issue thousands of certificates for phishing
    Let's Encrypt and Comodo domain-validated certificates accounted for 96% of phishing sites with a ...
  83. [83]
    Let's Encrypt issues certs to 'PayPal' phishing sites - Sophos News
    Mar 30, 2017 · These certificates do come with some validation of who is requesting them. The certificates that Let's Encrypt issues inky tell you that you ...
  84. [84]
    Extending Android Device Compatibility for Let's Encrypt Certificates
    Dec 21, 2020 · Older Android devices will retain access to Let's Encrypt sites via a 3-year cross-sign of ISRG Root X1 from DST Root CA X3, using a chain with ...
  85. [85]
    Any info on the upcoming ECDSA certificate chain with Android ...
    Apr 13, 2021 · Android 7.0 has a bug with ECDSA P-384, but 7.1+ works. RSA with compatibility chain is best for older Android. Let's Encrypt will use RSA by ...
  86. [86]
    Support for Android 7 and older from Oct 2024 - Help
    Apr 11, 2024 · Android 7 and older will not work with Let's Encrypt from Oct 2024. Workarounds include app upgrades, installing the root, using alternate ...
  87. [87]
    Pros and cons of 90-day certificate lifetimes - Issuance Policy
    Nov 30, 2015 · LE client automated methods to auto renew every 60 days. But offer a fallback safeguard if for unforeseen reasons auto renewal fails to run ...<|separator|>
  88. [88]
    90 days is too short. Automatic renewal is silly idea
    Jun 23, 2018 · With it possible to get 1-year certificates for less than $6, the money Let's Encrypt will save is not enough to warrant the risks that ...
  89. [89]
    March 13, 2019: End-of-Life for All TLS-SNI-01 Validation Support
    Oct 8, 2018 · In January of 2018 we disabled the TLS-SNI-01 domain validation method for most subscribers due to a vulnerability enabled by some shared ...
  90. [90]
    Let's Encrypt Begins Retirement of TLS-SNI-01 Validation
    Jan 22, 2019 · “To help people test their clients ahead of the deprecation date, we're going to disable the TLS-SNI-01 method in staging on 2019-01-22 (this ...
  91. [91]
    [PDF] 2025.02.02 Fosdem Let's Encrypt Talk
    Feb 2, 2025 · ○ Total annual budget of $6.7M. ○ Funding from corporate ... Let's Encrypt will cost about $4.5M in 2025. https://letsencrypt.org. Page ...
  92. [92]
    Upcoming Features - Let's Encrypt
    Short-lived Certificates. Around the end of 2025, we intend to allow any client which supports ACME Profiles (see below) to request a “shortlived” certificate.
  93. [93]
  94. [94]
  95. [95]
    Roadmap Request: Post Quantum Cryptography
    Dec 31, 2024 · NIST has made progress in Post Quantum Cryptography since discussed here: Cloudflare has a TLS hybrid implementation!Missing: billion | Show results with:billion