1. Landscape of ACME Client Support
Most users are focused on which ACME clients currently support IP address certificates. There is a clear list of supported clients, but the level of support varies, and some clients are still in development.
"Some ACME clients that I think currently support IP addresses are acme.sh, lego, traefik, acmez, caddy, and cert-manager. Certbot support should hopefully land pretty soon." β mcpherrinm "IPv4 certs are already working fine for me in Caddy, but I think there's some kinks to work out with IPv6." β jsheard
2. Practical Use Cases and Benefits
The primary motivation for using IP certificates is to decouple TLS from DNS, enabling secure communications for ephemeral services, internal networks, or situations where domain name provisioning is a bottleneck.
"I am guessing the use case for ip address certs is so your ephemeral services can do TLS communication, but now you don't need to depend on provisioning a record on the name server as well for something that you might be start hundreds or thousands of, that will only last for like an hour or day." β iamrobertismo "One thing this can be useful for is encrypted client hello (ECH), the way TLS/HTTPS can be used without disclosing the server name to any listening devices... With IP certificates, the outer TLS connection can just use the IP address in its readable SNI field and encrypt the actual hostname for the real connection." β jeroenhd
3. Debates Over Certificate Lifetimes and Operational Risk
There is significant discussion and concern regarding the short 6-day lifetime for IP certificates. Some users view it as an operational burden and a "single point of failure" risk, while others defend it as necessary due to IP transience and to support faster revocation.
"The push for shorter and shorter cert lifetimes is a really poor idea, and indicates that the people working on these initiatives have no idea how things are done in the wider world." β bigstrat2003 "I'm certain there are some who need this, but it's not me." β qwertox "The short-lived requirement seems pretty reasonable for IP certs as IP addresses are often rented and may bounce between users quickly... 6 days actually seems like a long time for this situation!" β kevincox
4. Concerns Over Centralization of Trust
Discussions often expand to critique the broader WebPKI system. Users express skepticism about the authority of Certificate Authorities, the influence of browser vendors, and the resilience of the trust model against geopolitical risks.
"You could argue that The Don in charge of the US is in control of letsencrypt... There's much more risk of state-sponsored cyber attacks against US companies." β cpach "TLS certs should be treated much more akin to SSH host keys in the known hosts file. Browsers should record the cert the first time they see it and then warn me if it changes before it's expiration date, or some time near the expiration date." β wang_li