CA/Browser Forum
Home » All CA/Browser Forum Posts » 2020-08-05 Minutes of the S/MIME Certificate Working Group

2020-08-05 Minutes of the S/MIME Certificate Working Group

Attendees (in alphabetical order)

Matthias Wiedenhorst (ACAB’c), Arno Fiedler (Arno Fiedler ), Li-Chun Chen (Chunghwa Telecom), Tsung-Min Kuo (Chunghwa Telecom), Andreas Henschel (D-TRUST), Enrico Entschew (D-TRUST), Dean Coclin (DigiCert), Stephen Davidson (DigiCert), India Donald (Federal PKI), Wendy Brown (Federal PKI), James Knapp (Federal PKI), Hugh Mercer (GlobalSign), Atsushi Inaba (GlobalSign), Hongquan Yin (Microsoft), Mike Reilly (Microsoft), Ben Wilson (Mozilla), Hazhar Ismail (MSC Trustgate.com Sdn Bhd), Ahmad Syafiq Md Zaini (MSC Trustgate.com Sdn Bhd), Pedro Fuentes (OISTE), Patrycja Tulinska (PSW), Rich Smith (Sectigo), Chris Kemmerer (SSL.com), Thanos Vrachnos (SSL.com), Mike Guenther (SwissSign), Markus Wichmann (TeleTrust), Morad Abou Nasser (TeleTrust), Rufus Buschart (TeleTrust), Corey Bonnell (Trustwave), Janet Hines (Trustwave), David Chen (TWCA), Jeff Ward (WebTrust), Don Sheehy (WebTrust)

1. Roll Call

The Roll Call was taken.

2. Read Antitrust Statement

The Antitrust/Compliance Statement was read.

3. Review Agenda

No changes to the distributed agenda were noted.

4. Approval of minutes from last teleconference

The minutes of the July 20 teleconference were approved as distributed.

5. Approval of New Members

The declarations of the following organisations were noted:

  • Certificate Issuer: Chungwa Telecom, iTrusChina, Sectigo, SSC
  • Interested Party: TeleTrusT

A vote by consensus was agreed that the applicants met the membership requirements of the Charter, and the applicants’ membership in the SMCWG was accepted by consensus.

6. Discussion of approach and deliverables

A discussion was held on the primary deliverables described in the SMCWG Charter. It was agreed that the group would initially begin by considering certificate profiles for S/MIME end entity certificates and CA certificates.

Members were asked to continue to provide examples of known requirements and standards for S/MIME certificates for the group’s consideration. So far, examples have been provided for Mozilla’s root policy, Gmail, the U.S. Federal PKI, ETSI, BSI/ Germany, and Siemens.

It was agreed that the deliverable would take the form of RFC 3647, indicating in sections where content is to be referred from the Baseline Requirements or other standard, or similarly noting deviations/enhancements to the referred text. “No stipulation” will be used in sections where no requirement is indicated.

It was agreed that the document would move to GitHub for commenting at a later date as initial text was proposed. It was suggested that the Infrastructure Committee of the CA/Browser Forum could hold a “GitHub for nonDevelopers” training session.

6. Any Other Business

The WG was encouraged to consider, when reviewing certificate profiles, opportunities to enhance the value of S/MIME certificates in evolving uses. For example, this might include marking certificates to note where keys were generated or stored (e.g., CA, service provider, OS, app, token), among other ideas.

No other business was discussed.

7. Next call

The next call will take place on August 19, 2020 at 11:00am Eastern Time. A separate invitation has been sent to members of the SMCWG; meetings will occur every other week in weeks of the main CABF call.

Adjourned

Latest releases
Server Certificate Requirements
SC095v3: Clean-up 2025 - Apr 2, 2026

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.13 - Ballot SMC015v2 - Mar 28, 2026

This ballot introduces requirements that a CA or RA must follow to rely upon a Mobile Drivers License (mDL) to provide evidence for the authentication of individual identity. It allows the use of mDL that conform to ISO/IEC 18013-5 and which may be verified by the CA or RA in conformance with ISO/IEC 18013-7. The CA or RA shall only accept mDL from an Issuing Authority that is legally authorized by the relevant government or jurisdiction to issue driving licenses. The draft also aligns the subsections of 3.2.4.2 (Validation of individual identity) to correspond more closely with those in 3.2.4.1 (Attribute collection of individual identity). It also includes minor editorial corrections. SMC015v2 was updated to remove an additional reference to the superceded ETSI EN 319 403. This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Ben Wilson (Mozilla) and Scott Rea (eMudhra).

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).