Podcast
Root Causes 179: Standards for Certificates Apart from SSL


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 24, 2021
Regular followers of this podcast hear a great deal about SSL, the CA/Browser Forum, and the standards governing public SSL. But SSL is not the only regulated type of public digital certificate. There are also things like S/MIME, eIDAS, code signing, document signing, and SSH certificates. In this episode our hosts discuss these "other" certificate types and the rules and regulations governing them.
Podcast Transcript
Lightly edited for flow and brevity.
Another one you mentioned is Code Signing. Code Signing is venerable. Code Signing has been - - or I guess it’s one I mentioned is Code Signing. Code Signing is venerable. Code Signing has been around almost as long as SSL has and Code Signing is kind of an interesting animal because for a long time – so we had regular Code Signing and we have EV Code Signing and all Code Signing certs were considered to be covered by the baseline requirements. Same thing that covers SSL. And the EV Code Signing certificates were covered by the EV Guidelines. Same thing that covers EV SSL and what’s interesting about that of course was that they are, and have been, they are different certificate types. So, for instance, there is a lot of focus on domain validation in the BRs and there are no domains in Code Signing certificates. Right? And timestamping is an important part of Code Signing and there is no discussion of timestamping in the BRs. So, what has been needed and the CA/Browser Forum has put together is specific guidelines that are focused on Code Signing so that you can understand what the rules look like in a Code Signing scenario in particular since it is a different kind of cert and it is focused on a very different use case.
Now, we haven’t talked - - what you did mention in the beginning and we haven’t really talked about is S/MIME. So, S/MIME is basically unregulated right now. So, again, the CA is expected to follow their Certificate Practices Statements but other than that, there is not really a program anywhere that says this is what you must do to issue a compliant S/MIME certificate and as a consequence, there is a lot of latitude and there could be a lot of variability and so the CA/Browser Forum recognizes this and has formed a working group, subcommittee, to create, to author and ratify a series of S/MIME baseline requirements essentially. So, you’ll have requirements for issuing S/MIME certificates the same way that there are requirements for let’s say SSL or Code Signing certificates and that, of course, has a few positive consequences. It creates a certain level of consistency so parties can know what to expect in terms of what information there is, what that information means and how it works and then also, there is a certain level of quality enforcement. Right? Practices that are deemed to be reliable and high-quality practices become codified and practices that are not become omitted and, in that way, CAs can do the things that are known to work. And so, - - and those of course can be adjusted over time just like has happened let’s say with the baseline requirements or the EV Guidelines. And so, that is on the way, too. I can’t tell you exactly when that will be ready but that is something that is in the works.

