Root Causes 437: Why Relying Only on Certificate Linters Is a Dangerous Practice

By Michael Thornton

March 30, 2025 at 10:14 PM

Linters are essential tools for checking certificate compliance, but they shouldn't be the only line of defense against misissuance. Here's why CAs shouldn't solely rely on linters:

Key Points About Linters:

  • They perform objective checks on certificates to verify compliance
  • Popular open-source options include ZLint and Pkilint
  • Can be used pre-issuance or post-issuance for verification

Limitations of Linters:

  • No single linter covers all possible requirements
  • Being open-source projects, updates may lag behind new requirements
  • They are necessary but not sufficient for complete compliance

Why Blaming Linters is Problematic:

  1. Incomplete Coverage: Linters cannot catch every possible issue
  2. Time Gaps: New requirements may not be immediately implemented
  3. Responsibility: CAs must maintain their own understanding and accountability

Best Practices for CAs:

  • Use linters as part of a comprehensive verification process
  • Maintain internal expertise and oversight
  • Contribute to open-source linter projects when gaps are found
  • Develop multiple safeguards beyond just linter checks

The Bottom Line: Linters are valuable tools for maintaining certificate quality, but they should be viewed as one component of a broader compliance strategy. CAs cannot outsource their responsibility to linters alone and must maintain active involvement in ensuring certificate compliance.

Tim Callan headshot in collared shirt

Tim Callan headshot in collared shirt

[Rest of images maintained as in original transcript]

Related Articles

Previous Articles