Replies: 1 comment 7 replies
-
Revocation of S/MIME works in the same way as TLS certs. RFC 8823 does not have specific section. The entire process is described in the RFC 8555. To revoke a certificate you need either:
Usually, if you have the PFX/P12 file, you are able to revoke it. If you do not have the account private key nor the certificate private key, you can contact to the CA the explain the issue and justify the revocation. Usually, if you can demonstrate that you are in possession of the e-mail account, the CA will revoke the certificate on your behalf. Regarding your points:
|
Beta Was this translation helpful? Give feedback.
7 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Probably this is already covered in the RFC standard, but let's assume that you create two acme certificates for the same account, one for each machine. One machine is compromised, and if they have access to the S/MIME certificate, we can assume they have all other credentials to impersonate you.
Then how can the right person revoke the old certificate. The actor has access to the email account, so how can they be stopped from issuing new certificates?
On a related note, what setups are there to:
dmarc
record.Beta Was this translation helpful? Give feedback.
All reactions