The CA/Browser Forum (CABF) has created a set of Baseline Requirements for publicly trusted S/MIME digital certificates (S/MIME BRs), with an effective date of September 1, 2023.
The S/MIME BRs (https://cabforum.org/smime-br/) are the result of several years of work by the CA/Browser Forum’s S/MIME working group, which included representatives from CAs around the world, email software providers, auditors, and communities that use S/MIME. The S/MIME BRs contain requirements governing certificate profiles, verification of control over email addresses, validation of identity, key management and certificate lifecycles, and CA operational practices, including physical and logical security.
The S/MIME BRs define four S/MIME certificate types and three generations, as follows:
Types
Mailbox-validated: the Subject is limited to (optional) emailAddress and/or serialNumber attributes.
Individual-validated: the Subject includes only individual (natural person) attributes.
Organization-validated: the Subject includes organization details (legal entity)
Sponsor-validated: the most common type of S/MIME certificate, often issued by an Enterprise to its employees. The Subject includes organization details as well as attributes of a ‘sponsored’ individual.
Generations
Legacy: A flexible profile to facilitate moving reasonable practices of the existing S/MIME ecosystem with 1,185 days maximum validity.
Multipurpose: Modeled on Strict, but with more flexibility in allowed EKUs (up to 825-day validity).
Strict: The long-term target profile limited to supporting only id-kp-emailProtection (up to 825-day validity).
Validation Methods
Methods of email validation require the establishment of control of the following:
the entire email domain, using existing methods defined in section 3.2.2.4 of the CABF’s TLS BRs;
specific email addresses, using a challenge/response email process; or
the SMTP FQDN to which a message to the email address should be directed.
Soon I will be starting a separate discussion for us to talk about how Mozilla’s Root Store Policy should be updated to require and enforce the S/MIME BRs. This will be followed by other proposed changes to the Mozilla Root Store Policy for version 2.9 as well.
Regards,
Ben