Root Causes 437: Why Relying Only on Certificate Linters Is a Dangerous Practice
Linters are essential tools for checking certificate compliance, but they shouldn't be the only line of defense against misissuance. Here's why CAs shouldn't solely rely on linters:
Key Points About Linters:
- They perform objective checks on certificates to verify compliance
- Popular open-source options include ZLint and Pkilint
- Can be used pre-issuance or post-issuance for verification
Limitations of Linters:
- No single linter covers all possible requirements
- Being open-source projects, updates may lag behind new requirements
- They are necessary but not sufficient for complete compliance
Why Blaming Linters is Problematic:
- Incomplete Coverage: Linters cannot catch every possible issue
- Time Gaps: New requirements may not be immediately implemented
- Responsibility: CAs must maintain their own understanding and accountability
Best Practices for CAs:
- Use linters as part of a comprehensive verification process
- Maintain internal expertise and oversight
- Contribute to open-source linter projects when gaps are found
- Develop multiple safeguards beyond just linter checks
The Bottom Line: Linters are valuable tools for maintaining certificate quality, but they should be viewed as one component of a broader compliance strategy. CAs cannot outsource their responsibility to linters alone and must maintain active involvement in ensuring certificate compliance.

Tim Callan headshot in collared shirt
[Rest of images maintained as in original transcript]
Related Articles

Root Causes: The 12 Critical Bugzilla Mistakes CAs Must Stop Making
