Learning from LoL (League of Legends) Certificate Expiration Incident: How AWS ACM Automatic Renewal Works

Learning from LoL (League of Legends) Certificate Expiration Incident: How AWS ACM Automatic Renewal Works

2026.01.08

This page has been translated by machine translation. View original

Introduction

On January 4, 2026, a major outage occurred in the MOBA game League of Legends (LoL) due to an expired SSL certificate.
In this article, I'll organize the details of the outage and introduce an automatic certificate renewal mechanism using AWS Certificate Manager (ACM).

Outage Timeline

On January 4, 2026, the SSL certificate used by the LoL game client expired, preventing players worldwide from connecting to game servers.

In fact, a similar outage had occurred in 2016, and the certificate issued at that time had reached its expiration exactly 10 years later.

Certificate Details

Field Value
Common Name (CN) rclient
Issued By LoL Game Engineering Certificate Authority
Issued On Thursday, January 7, 2016 at 9:03:33 PM
Expires On Sunday, January 4, 2026 at 9:03:33 PM
Valid Period About 10 years

Why Everyone Lost Connection

In SSL/TLS communications, the client-side checks the certificate's expiration date.
Expired certificates are deemed "untrustworthy," and connections are rejected.

Client-side verification flow:
1. Receive certificate from server
2. Check expiration date → Reject if expired
3. Reject connection (no exceptions)

While browsers offer a "proceed anyway" option, game clients don't have such a bypass.

How Certificates Are Managed with AWS ACM

AWS Certificate Manager (ACM) is a managed service for issuing, managing, and automatically renewing SSL/TLS certificates.

Official documentation: Managed certificate renewal in AWS Certificate Manager

Conditions for Automatic Renewal

For ACM to automatically renew certificates, the following conditions must be met:

Condition Description
Use DNS validation Issue certificates with DNS validation, not email validation
Validation records exist CNAME records remain in Route 53 or similar DNS
Linked to AWS service In use with ELB, CloudFront, API Gateway, etc.

If these conditions are met, ACM automatically begins the renewal process 60 days before expiration.

Comparison with Manual Management

Item Manual Management (Riot's case) ACM Auto-Renewal
Renewal Trigger Humans must remember Automatic (starts 60 days before)
Human Error Risk High Almost zero
Certificate Deployment Manual server installation Automatic implementation to AWS services
Cost Paid CA + labor costs ACM public certificates are free

Testing Manually in Practice

New certificates have about 13 months validity, so we can't reproduce an expiration, but we can verify the flow from certificate issuance to becoming eligible for automatic renewal.

Prerequisites

  • A test domain in Route 53
  • API Gateway (REST API) already created (steps omitted)

Step 1: Request a Certificate in ACM

  1. Open Certificate Manager in the AWS console
  2. Click Request a certificate
  3. Select Request a public certificate
  4. Enter domain name (e.g., example.com, *.example.com)
  5. Select DNS validation as validation method
  6. Click Request

1

2

3

Step 2: Complete DNS Validation

On the certificate details screen, clicking the Create records in Route 53 button automatically adds CNAME validation records to Route 53.

After a short wait, the Status changes to Success.

4

5

6

7

Step 3: Check Certificate Renewal Eligibility Status

At this point, the certificate is not yet linked to any AWS service, so it's not eligible for automatic renewal.

Renewal eligibility: Ineligible

8

Step 4: Link Certificate to API Gateway

Open Custom domain names in the API Gateway console and click the Add domain name button.
Select ACM certificate in the detailed settings screen.

Screenshot 2026-01-07 at 5.16.28 PM

Step 5: Confirm Automatic Renewal Eligibility

After linking to API Gateway, check the certificate in the ACM console to see its status has changed.

Renewal eligibility: Eligible

10

Now ACM will automatically renew the certificate starting 60 days before expiration.

Conclusion

With AWS ACM, certificate renewal happens automatically as long as DNS validation records are maintained. By automating certificate management, you can significantly reduce the risk of outages caused by human error.

Share this article

FacebookHatena blogX

Related articles