CA/Browser Forum
Home » All CA/Browser Forum Posts » 2025-12-03 Minutes of the S/MIME Certificate Working Group

2025-12-03 Minutes of the S/MIME Certificate Working Group

Minutes of SMCWG

December 3, 2025

These are the Minutes of the meeting described in the subject of this message. Corrections and clarifications where needed are encouraged by reply.

1. Roll Call

2. Note well: Antitrust / Compliance Statement

3. Approval of past minutes

The following minutes were approved:

  • November 19

Minutes provided by Stephen Davidson.

4. Review Agenda

5. Membership

NA

6. Discussion

  • An invited guest presentation was provided on “S/MINE: Collecting and Analyzing S/MIME Certificates at Scale.” by Gurur Öndarö and Jonas Kaspereit, Münster University of Applied Sciences; Samson Umezulike, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE; Christoph Saatjohann, Münster University of Applied Sciences; Fabian Ising, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE; Sebastian Schinzel, Münster University of Applied Sciences, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE.

  • See more at https://www.usenix.org/conference/usenixsecurity25/presentation/oendaroe

  • The study collected more than 41 million unique X.509 certificates from public address books (LDAP servers) of which 38 million fulfill the requirements for use as S/MIME certificates. Approximately 20% of the certificates are public trust. The study used tools such as PKILINT to analyze compliance aspects of the certificates. The study identified improvements in the ecosystem driven by the CABF’s S/MIME Baseline Requirements (and noted some noncompliant issuance amongst a handful of public issuers.

  • The group is now conducting analysis into patterns of key reuse among the certificates identified in the study. Among certs reusing keys there is a particular hump at 6 years validity of keys (which makes sense given that S/MIME are often issued at 1. 2,3 year validity spans).

  • Stephen asked if that data could be broken down for public vs private trust, currently valid. He also said it would be of interest to know if keys are shared across Subjects.

  • Sebastian Schinzel said it was known that a provider issued signing certs that were indistinguishable from S/MIME had previously been found to mistakenly reusing keys at scale. Stephen said it was hoped that these other use cases would stop using the emailProtection EKU and move towards the freestanding documentSigning EKU. Stefan Selbitschka said that historically some email gateway solutions reused keys across Subjects.

  • Stephen noted that the LDAP pool was large but not necessarily fully representative. However he said the research identified useful trends, and thanked the researchers for their work. Ben Wilson said it was equally interesting to understand more about the health of the private trust S/MIME sector. Stephen expressed interest in following up when the research into key reuse is complete.

7. Next meeting:

  • December 17, 2025 at 11 am Eastern. December 31 meeting is cancelled.

8. Any other business

NA

9. Adjourn

Attendees:

Adriano Santoni (Actalis S.p.A.), Andy Warner (Google), Ashish Dhiman (GlobalSign), Ben Wilson (Mozilla), Corey Bonnell (DigiCert), Dustin Hollenback (Apple), Enrico Entschew (D-TRUST), Guillaume Amringer (Carillon Information Security Inc.), Hazhar Ismail (MSC Trustgate Sdn Bhd), Inaba Atsushi (GlobalSign), Iñigo Barreira (Sectigo), Judith Spencer (CertiPath), Luis Cervantes (SSL.com), Malcolm Idaho (IdenTrust), Marco Schambach (IdenTrust), Martijn Katerbarg (Sectigo), Nome Huang (TrustAsia), Ono Fumiaki (SECOM Trust Systems), Peter Miskovic (Disig), Rebecca Kelly (SSL.com), Rich Smith (DigiCert), Sandy Balzer (SwissSign), Scott Rea (eMudhra), Sean Huang (TWCA), Stefan Selbitschka (rundQuadrat), Stephen Davidson (DigiCert), Tim Crawford (CPA Canada/WebTrust), Wendy Brown (US Federal PKI Management Authority)

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.12 - Ballot SMC014 - Oct 13, 2025

This ballot introduces requirements that a Certificate Issuer MUST deploy DNSSEC validation back to the IANA DNSSEC root trust anchor on all DNS queries associated with CAA record lookups performed by the Primary Network Perspective, effective March 15, 2026. The ballot is intended to maintain consistency in the S/MIME Baseline Requirements with the requirements of Ballot SC-085 which implemented identical requirements in the TLS Baseline Requirements. Note: SC-085 also introduced requirements in TLS Baseline Requirements for the use of DNSSEC in domain control validation. These requirements are automatically adopted in the S/MIME BR by the email domain control methods that include a normative reference to section 3.2.2.4 of the TLS Baseline Requirements. The draft also includes minor corrections to web links in the text. This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Client Wilson (Apple) and Ashish Dhiman (GlobalSign).

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).