PROBABLYPWNED
AnnouncementsMay 9, 20263 min read

Let's Encrypt Halts All Certificate Issuance After Root Signing Mishap

Let's Encrypt suspended certificate operations for 2.5 hours on May 8 after discovering a cross-signed certificate linking Generation X and Y roots incorrectly.

ProbablyPwned Team

Let's Encrypt suspended all certificate issuance on May 8, 2026, after engineers discovered a critical misconfiguration in a cross-signed certificate linking the CA's current Generation X root to its upcoming Generation Y infrastructure.

The incident began at 18:37 UTC when engineers identified the issue. Within minutes, all certificate generation was halted across both production and staging environments. Issuance resumed at 21:03 UTC—roughly two and a half hours later—after the problematic cross-signature was rolled back.

What Happened

The cross-signed certificate was part of Let's Encrypt's transition from its Generation X root hierarchy to the newer Generation Y infrastructure. Cross-signing allows newer certificates to chain back to older, widely-trusted roots while the new root propagates through trust stores.

Something in this cross-signature configuration was incorrect. Let's Encrypt hasn't disclosed specific technical details, but the organization took the conservative approach of halting all operations rather than risk issuing certificates with improper chain validation.

As a result of the rollback, all certificate generation reverted to the Generation X root. This specifically impacts two ACME certificate profiles: tlsserver and shortlived.

Timing Adds Pressure

The incident comes just five days before Let's Encrypt planned to roll out three significant platform changes on May 13, 2026:

  • The tlsserver ACME profile begins issuing 45-day certificates
  • New certificate profiles with modified chain behaviors
  • Infrastructure changes supporting the shorter certificate lifetime roadmap

Let's Encrypt announced in December 2025 that it would progressively reduce certificate lifetimes from 90 days to 45 days over the next two years. The May 13 milestone marks the first phase of that transition. This incident doesn't delay those plans, but it does highlight the complexity involved in managing root certificate infrastructure at scale.

Impact on Administrators

Organizations relying on automated ACME renewal workflows—particularly those using the tlsserver or shortlived profiles—should verify that certificates issued around the May 8 window chain correctly to expected roots. Most modern ACME clients handle chain changes transparently, but edge cases exist.

Administrators who noticed renewal failures during the 2.5-hour window should trigger manual renewals. Certbot, acme.sh, and other popular clients will retry automatically, but manual intervention may be faster than waiting for scheduled retry attempts.

For context on certificate management best practices, our online safety guide covers TLS configuration fundamentals, though this incident primarily affects server administrators rather than end users.

Why This Matters

Let's Encrypt secures over 300 million websites and issues billions of certificates annually. A sustained outage or mis-issuance event would have cascading effects across the web. The organization's decision to halt operations entirely rather than risk incorrect certificate chains reflects appropriate caution for infrastructure of this scale.

Certificate authority incidents have historically caused significant disruption. The DigiCert mass-revocation earlier this year affected thousands of organizations when compliance issues forced rapid certificate replacement. Let's Encrypt's quick identification and resolution of this issue before any problematic certificates were widely deployed represents a best-case outcome for this type of incident.

Organizations heavily dependent on Let's Encrypt should consider maintaining backup CA relationships for critical infrastructure. We've seen similar certificate-related disruptions with Cisco's upcoming TLS client authentication changes, and the pattern is clear: certificate infrastructure requires proactive planning. The nonprofit nature of Let's Encrypt means it operates with limited resources compared to commercial CAs, and redundancy planning remains prudent.

Further updates will be posted to Let's Encrypt's status page as the organization completes its post-incident review.

Related Articles