Podcast
Root Causes 187: Apple Limits Term for S/MIME Certificates


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
November 8, 2021
Apple recently announced that it would limit the allowable term for public S/MIME certificates to 825 days. Our hosts explain this declaration's implications.
Podcast Transcript
Lightly edited for flow and brevity.
Now, what that means when I say that is there's two ways that a major operating system vendor can enforce a term limit on certificates and one of that is just an application limit. They say, our software is going to distrust certs that are longer than this many days old, or our software is going to distrust certs issued after a certain date that are issued for more than this many days, and you do that on an OS basis. So, Apple could have done that, at which point I wouldn't be able to send these S/MIME certs to Apple Mail users because their phone wouldn't honor it, wouldn't see it. Instead, they decided to make it a root store requirement, and what this means is that Apple is declaring any public CA who is issuing public certs beyond these 825 days is going to be in violation of our root program and, in principle, could be distrusted over it. This was a pretty strong move on Apple's part in terms of limiting the term of S/MIME certificates.
When they gave their reasons why, it wa not really surprising. It was more or less the same reasons that we heard and hear on the SSL side, which is two main things.
First of all, shorter lived certificates are more secure. You and I have gone into a lot of detail in previous podcasts about the various reasons that that's the case. The other one is and, again, this is not really a surprise, is that it allows greater crypto agility. So, there is the sense whatever changes that we make for our certificates, we say, okay, from now on, we're going to require this hashing algorithm or this minimum key length or this amount of entropy and a serial number or whatever it is, you then have until all the existing issued certs age out before that is something you can rely on. Not that long ago, that was three years. So, you'd say we're going to force this cryptographic change, and three years later there could still be active certs that were compliant, that didn't have that cryptographic change. Then they took that down to two years a few years ago. Now, in the SSL world, they took it down to one year. So, in the S/MIME world, it's still sitting at years, or whatever. Could be more. And Apple said, we're going to put a cap on it. We're going to take that down to two years. This is in advance of the BR guidelines, the S/MIME, CA/Browser Forum guidelines and in advance of the completion of that process. That's where it's a little surprising, Jay, is there was a process. It was a slow process, but these processes are slow. But Apple just decided to accelerate the whole thing and let everybody else deal with it.
I think a lot people think about signed documents. I have a document that's signed, and I want that signing to remain secure for a week, two weeks, a month. You don't think about the quantum apocalypse within that kind of time period. But for documents and contracts that are going to last longer, it becomes a big question mark. And so, therefore, if you have sensitive emails, for example, encrypting those emails is something you don't have to worry about for a little while, but I definitely think that authentication into email systems is something you do have to worry about. But the one you really have to worry about is signing. That's the one where bringing down, Tim, the S/MIME, you know, the length of time to live for an S/MIME certificate, down to two years down to one year, perhaps down in the nearer future, is not an irrational thing to do as we face the quantum apocalypse.

