Podcast
Root Causes 258: New S/MIME Baseline Requirements Ratified


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
November 22, 2022
The CA/Browser Forum has passed new Baseline Requirements for S/MIME certificates, in effect late 2023. In this episode we explain the broad stipulations of the new S/MIME BRs, including the multiple available levels of authentication and use case profiles that will be allowed.
Podcast Transcript
Lightly edited for flow and brevity.
So the short, short on the headline is that the CA/Browser Forum very recently passed the first ever set of Baseline Requirements for S/MIME certificates.
When the BRs come out, there are four – and let’s get to dates too – but when the BRs came out, they have four different levels of validation and three different what I’ll call profiles and you can imagine it as a 4 X 3 matrix. So, there’s 12 boxes and a cert can sit in any of those 12 boxes. All of them at least on day 1 are equally legitimate.
So, let’s start with validation levels. What do you say?
The first validation level is simply called Mailbox level, and Mailbox level validation is just we validate the email address. You have to have control over this email address. If you don’t have control of this email address, you don’t get the cert. We are not gonna attest anything else about you. That’s the S/MIME equivalent of a DV certificate. A DV certificate says all I’m gonna attest is that you control this domain. I don’t know who you are, where you are, or anything else. I just know you control this domain. Same thing with a mailbox level S/MIME cert. All we know is you control the certificate and just like with DV, this is likely to be the quickest one to issue because there will be an automated thing. You’ll be able to respond in real time. You get the email, you click on the thing, now you’ve validated that you control the mailbox, and you get on with your life. So, that’ll in many ways probably be the quickest and most convenient.
Next is what we call Organization validation. And Organization validation also validates the email address. They all do. But it also validates the name of the company or other organization that you are using the certificate for. It does not validate any individual’s name. So, this is for the scenario where I want to put an S/MIME certificate on an email address that is not specific to a person. This is [email protected], [email protected], or my email program or my marketing promotion that I’m running right now @companyname.com. Right? And in that case, if you want to put an S/MIME certificate on that, it doesn’t get attached to an individual. It’s not your marketing programs manager. It is just the company. And so, under those circumstances, we validate the email and the organization name and that’s called Organization validation. And perhaps not surprisingly, Organization validation looks an awful darn lot like what we do today for SSL and code signing. Right? Of course, because we are gonna use the benefit of all that work, we’ve done for all those years getting those things optimized and dialed in.
Then the third level is what we call Sponsored. And Sponsored is an individual in an organization. So, in this case, we have the email, the organization name and the individual’s name. So, if you, Jason, wanted to put an S/MIME on your work email, which I know from experience you have one, and you wanted it to be associated with your name, this is the one you would get. It would be this is Jason.Soroko as a Sectigo employee and the cert contains all of that information. So that’s what we call Sponsored.
And then the last one is Individual. This is for an individual, but it isn’t supposed to be associated with an organization. So if you wanted an S/MIME certificate for your own personal email, which I bet you you have, then that’s what we would do in that case. It would be an email and it would be the natural person who gets that email regardless of where they are employed because the company or the organization is not part of this.
So, those are those four validation levels and maybe validation level isn’t quite the right word but it’s the scope of what is validated.
Then there were profiles and I want to think of whether I want to do this. I think let’s start, let’s go strictest to loosest.
So, the first profile is what we call Strict. So, a Strict S/MIME certificate is only used for the S/MIME purpose. You attach it to email. That is what you do and if that is set, if it’s set that way in the certificate, then that is the only thing you can actually use it for legally. That’s the strictest profile. It is called Strict.
The next one up the scale or down the scale depending on how you look at it is called Multi-purpose. And Multi-purpose allows multiple defined purposes. For example, S/MIME and document signing. So, you say I’m gonna put this on your laptop. You are gonna be able to sign documents. You are also gonna be able to use it to attach to your email. This is a multi-purpose certificate. The EKU is set that way, and that’s how you use it. Now, the S/MIME and multipurpose profiles are capped at two years in term. So, you’ll be maxed out at two years and right now, there’s no rules. In principle, you could issue a 20-year S/MIME certificate. We don’t, but you could. There are no rules. And so, those two will be capped at two years.
And then the last profile is what we call Legacy and Legacy is up to three years in term and the rules in general are looser. The idea there is that’s where we are giving everybody a chance to transition. So, you can order Legacy certificates. They work pretty effectively in the scenarios you are using them for today. You start plugging them in and then you know that you are gonna have a certain amount of time where you are gonna have to be able to fit into the specific set of requirements that are in the BRs and in that kind of timeframe, that’s gonna have to happen. But there’s a lot of time built in there because the terms are allowed to be up to three years, and there’s time between now and when the new S/MIME BRs actually come into effect, and there will be time between when the BRs come into effect and when those get deprecated. But the understanding that is unambiguous that has already been discussed in the CA/Browser Forum discussion about this (and everybody who is involved is really kind of in principle in agreement) is we are going to return to this and build a deprecation plan and a deprecation schedule into the rules so that the legacy profile in the long run will go away. If you telegraph it well in advance, let people know that this is coming so they can see it, don’t break what they have today but also make it clear that, look, here’s a clear schedule and in this schedule you are gonna have to transition. And that’s believed and I think correctly that’s believed to be the best alternative for enforcing rigor around S/MIME without just chasing people away from certificate use altogether.

