Categories: Security

Email Certificate Standards Updated to Support ACME Automation & Future PQC Security

Changes to the S/MIME Certificate Baseline Requirements add support for automated mailbox validation (via the ACME protocol) and post-quantum cryptography algorithm testing

Sponsored

July 2025 was a busy period in the CA/Brower Forum’s (CABF) S/MIME Certificate Working Group (SMCWG). There are two key ballots relating to S/MIME certificates that have been approved (SMC013) or adopted (SMC012) in the last month:

  1. SMC012: Introduce ACME for S/MIME was officially adopted as part of the S/MIME Baseline Requirements on July 2. This ballot provides certification authorities (CAs) with a standardized and automated way to respond to mailbox control validation requests using the ACME protocol. This offers another automation-friendly method for CAs to validate mailbox addresses.
  2. SMC013: Enable PQC Algorithms for S/MIME entered a 30-day review period that’s set to end Aug. 20. This ballot aims to add the use of two post-quantum cryptography (PQC) algorithms into the S/MIME Baseline Requirements. These certificates are intended for testing (by CAs and clients) and wouldn’t be generally available. However, this move marks yet another step that on the road that ultimately leads to PQC adoption and usage on public networks.

So, what’s the deal with these two ballots and how are they intended to enhance email security and mailbox domain validations? While these changes won’t directly impact your organization in terms of preparations, our goal is to keep you apprised of the latest S/MIME industry developments.

Let’s hash it out.

Sponsored
Sponsored

The post Email Certificate Standards Updated to Support ACME Automation & Future PQC Security appeared first on Hashed Out by The SSL Store™.

OnlineDocs Manager

Share
Published by
OnlineDocs Manager

Recent Posts

PyPI in 2025: A Year in Review

As 2025 comes to a close, it's time to look back at another busy year…

1 week ago

Y25 Cycle 6 Engineering Progress Report

Providing insight into our product roadmap and, subsequently, the projects being worked on in our…

3 weeks ago

Development Cycle Six

Providing insight into our product roadmap and, subsequently, the projects being worked on in our…

3 weeks ago

Independent Collectives are becoming Organizations

TL;DR: Independent Collectives are being converted to Organizations to make the platform more consistent. There…

4 weeks ago

PyPI and Shai-Hulud: Staying Secure Amid Emerging Threats

An attack on the npm ecosystem continues to evolve, exploiting compromised accounts to publish malicious…

1 month ago

New Login Verification for TOTP-based Logins

We've implemented a new security feature designed to protect PyPI users from phishing attacks: email…

2 months ago

This website uses cookies.