31 Jan 2024
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
In January 2024, CA/Browser Forum voted to adopt Certification Authority Authorization (CAA) for S/MIME certificates. There were nineteen votes cast, supporting ballot SCM05. CAs are recommended to adopt the new CAA features by September 15, 2024; support will become mandatory on March 15, 2025.
CAA was initially published as an RFC in 2013 (RFC 6844, obsoleted in 2019 by RFC 8659), but it took four years for the CA/Browser Forum to adopt it for server certificates. Since then, a variety of minor extensions have been added, all for control of server certificate issuance. We wrote more about the new features in our February 2023 newsletter. CAA for S/MIME certificates is a recent improvement, having been published as RFC 9495 in October 2023.
In the anticipation of the new CAA features, now is a good time to start planning your organization’s default CAA configuration. Most companies will not use S/MIME certificates, so it may be prudent to disallow all such issuance. Here’s an example configuration with a mix of issue
, issuewild
, and issuemail
properties:
example.com. CAA 0 issue "letsencrypt.org" example.com. CAA 0 issuewild "digicert.com" example.com. CAA 0 issuewild "entrust.com" example.com. CAA 0 issuemail ";" example.com. CAA 0 iodef "pki@example.com"
This subscription is just for the newsletter; we won't send you anything else.
Here are some things that caught our attention since the previous newsletter:
¯\_(ツ)_/¯
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.