Skip to content

Conversation

@scouten-adobe
Copy link
Member

No description provided.

@scouten-adobe scouten-adobe self-assigned this Sep 16, 2025

The *CAWG trust list* MUST be configured to recognize certificates with `id-kp-emailProtection` (1.3.6.1.5.5.7.3.4) for *identity assertions* issued during the validity window described above.

For this EKU, the following certificate policy IDs MUST be accepted:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this intended to say "only certificates with these CPs will be accepted"? If so:

  1. The wording should be adjusted
  2. Does this reflect real-world usage? It's a bit of a wild west out there in terms of the CPs being added to certificates.

scouten-adobe and others added 2 commits October 8, 2025 18:02
Co-authored-by: Leonard Rosenthol <leonardr@lazerware.com>
scouten-adobe and others added 3 commits October 9, 2025 10:30
Co-authored-by: Charlie Halford <charlie.halford@gmail.com>
# Conflicts:
#	docs/modules/ROOT/partials/credential-types/x509.adoc
IMPORTANT: This list does not include Mailbox-validated or “legacy” certificate purpose OIDs.
+
NOTE: The issuance criteria for such certificates are specified by the CA/Browser Forum in https://cabforum.org/uploads/CA-Browser-Forum-SMIMEBR-1.0.11.pdf[Baseline Requirements for the Issuance and Management of Publicly‐Trusted S/MIME Certificates, version 1.0.11] and may be updated in subsequent versions.
4. The certificate chains up to one of the following roots of trust:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
4. The certificate chains up to one of the following roots of trust:
4. The lists below may include both CA and end-entity certificates. The certificate under validation MUST either be directly included in one of these lists, or have a valid chain of trust to a certificate present in one of these lists.

The IPTC list currently includes end-entity certificates, can we ensure validators support this? That's usually the assumption with end-entity certs in trust lists, but it would be good to be explicit.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants