I'm curious about the actual usefulness of Secure Email (S/MIME) Certificates. I understand the technical aspects: the email sender signs their messages using a private key, while the recipient can verify this using the public key, both issued by a trusted Certificate Authority (CA). However, my experience getting my certificate was pretty straightforward—I just had to prove I could access my email through a simple link. This raises the question: what does the digital signature really guarantee? It seems like it only confirms that someone who once had access to my email is still using the private key to sign emails, but it doesn't specifically confirm that it's actually me doing the signing. While the "Verified Sender" icon looks nice, I'm wondering how much value it truly adds.
5 Answers
Just having any sort of certificate isn't enough. A certificate from a reputable CA that has solid security measures is essential. It shows that the sender not only has the certificate but also possesses some secret knowledge related to it. If this certificate is linked to something like a government-issued ID, you get stronger assurance. However, unless you know the issuer’s background, such as its validation process, that assurance might not mean much to random recipients.
The effectiveness of S/MIME signatures heavily depends on the security of the underlying PKI (Public Key Infrastructure). For instance, high-security certificates like those used by DoD ECA require passwords for signing and come with more stringent validation processes, making them more reliable than basic certificates. However, if a certificate is issued by a known and trusted CA, it can still serve as a higher level of assurance than a regular email without any signature.
You bring up a good point about the verification process for CAs. There are indeed different classes of certificates. Class 1 just verifies that the user has access to the email, while Classes 2 and 3 offer more validation like requiring ID or company registration. This is similar to TLS certificates, where a Domain Validated (DV) cert merely confirms access to a domain's DNS at some point—similar to how you had to access your mailbox for S/MIME.
In real-world scenarios, I’d argue that S/MIME can actually complicate communication more than it helps. Different email clients often struggle with S/MIME, which can lead to issues with message delivery and readability.
Definitely. There are various classes of certificates. A Class 1 certificate will guarantee that the email hasn't been altered but only confirms the sender's email address. In contrast, a Class 3 certificate can include the organization’s and individual’s validated information, providing a strong level of trust. Plus, besides authentication, S/MIME can also be used for encrypting emails, enhancing privacy further.

That’s true! But how can recipients actually verify the reliability of the PKI behind the S/MIME signature they just received?