Categories: Security

An Explainer Guide on Multi-Perspective Issuance Corroboration (MPIC)

Internet security is leveling up with MPIC. While your organization likely won’t need to do anything to prepare, here’s what to know about the industry’s changes and why they’re good for security

Sponsored

Starting Sept 15, 2025, all publicly trusted certification authorities (CAs such as DigiCert, Sectigo, etc.) must perform domain validation and CAA record checks using multiple network perspectives. This method, known as multi-perspective issuance corroboration (MPIC), aims to ensure that an attacker who poisons or compromises DNS servers in one area won’t be able to issue an SSL/TLS or S/MIME certificate for a domain they don’t control.

This concept of MPIC is similar to how the National Hockey League (NHL) relies on multiple officials (two referees, 2 linesmen) during a hockey game:

  • The refs strategically position themselves in different positions around the ice, so they have different gameplay vantage points. (Think of this as different “network perspectives.”)
  • If all officials agree that a puck crosses the net’s red line without penalty, then the team scores a goal.
  • If even just one of those officials reports seeing the situation differently, then the goal goes under review to determine whether it’s valid or must be disallowed.

Seeing as how this next phase of the certificate issuance requirement rollout takes effect next week, and we’ve not talked much about MPIC before, now seems like the perfect time to briefly talk about what MPIC entails for websites and email. We’ll also address why these changes are happening and how this multiple vantage point verification approach improves security by mitigating fraudulent server certificate issuances.

Sponsored
Sponsored

Let’s hash it out.

The post An Explainer Guide on Multi-Perspective Issuance Corroboration (MPIC) appeared first on Hashed Out by The SSL Store™.

OnlineDocs Manager

Share
Published by
OnlineDocs Manager

Recent Posts

Signature Verification: How to Verify a Digital Signature Online

Digital signatures add another layer of security to your online transactions and communications. But how…

2 weeks ago

Phishing attacks with new domains likely to continue

Unfortunately the string of phishing attacks using domain-confusionand legitimate-looking emails continues. This is the same…

1 month ago

Token Exfiltration Campaign via GitHub Actions Workflows

SummaryI recently responded to an attack campaign where malicious actors injected code into GitHub Actions…

1 month ago

‘World Quantum Readiness Day’ Returns with the Latest in PQC

Sept. 10: Get actionable insights from 20+ global experts as they discuss PQC readiness assessments,…

2 months ago

Preventing Domain Resurrection Attacks

SummaryPyPI now checks for expired domains to prevent domain resurrection attacks,a type of supply-chain attack…

2 months ago

PyPI now serves project status markers in API responses

PyPI now serves project status markers in its standardindex APIs. This allows downstream consumers (like…

3 months ago

This website uses cookies.