Letsencrypt will kill SMTP server auth following Chrome CA policy change
58 comments
·May 16, 2025CaptainFever
nashashmi
The mastadon post should have linked to that. But he wanted to rant about its practical effects on the system, namely smtp servers. LE did not really mention how this impacts developers
Aissen
The letsencrypt article is iterally the first link in the mastodon post, and indeed the mastodon post gives more context than letsencrypt's blog on the impact. As well as a link down-thread on where the rationale is in the Chrome root program.
arccy
not even most smtp servers, just his special setup
blueflow
Why is it Google that is making these rules? A company would not have this kind of power in a fair competition market.
WorldPeas
now I guess we understand why chrome is too dangerous for them to own from a monopolistic standpoint
DocTomoe
You could say that about any large browser vendor, and I seem to remember there having been a 'free' CA (OpenCA? FreeCA?) in the late 2000s, early 2010s which lost Firefox support over something small as well.
The truth is - the whole infrastructure depends on trust. And of one vendor of a major browser decides to no longer trust a CA, for whatever reason, the CA becomes essentially worthless overnight.
Yes, people theoretically can install their own Root certificates. No, 99,99% of internet users won't.
WorldPeas
The problem here is conflict of interest, Google is very interested in maintaining the GMail monopoly, that is likely the #1 reason people have google accounts. Correct me if I'm wrong but no other vendors save for edge(MS) and safari(Apple) own a mail service, a browser should be an impartial connection to an open ecosystem, and especially in Apple or MSIE's case we can see how this can be severely abused.
aaomidi
Google is making these rules for it's own root program. There are multiple root programs out there.
Also, root programs have their own requirements, and then the general baseline requirements discussed in the CA/B forum.
The industry self-regulates pretty darn well.
jaoane
Isn’t Let’s Encrypt basically Google? Google pushed it by punishing the ranking of search results that didn’t use ssl.
toomuchtodo
No, Let's Encrypt is an independent entity.
https://www.abetterinternet.org/about/
> ISRG is a California public benefit corporation, and is recognized by the IRS as a tax-exempt organization under Section 501(c)(3) of the Internal Revenue Code.
bityard
But Google is one of their top sponsors: https://www.abetterinternet.org/sponsors/
rnhmjoj
I've read the announcement[1] and I don't see how this deprecation has anything to do with SMTP. Is it because the sending MTA will present its own server certificate as a client certificate to the receiving MTA? I thought most of this traffic was outright unencrypted or opportunistically encrypted with self-signed certs.
Do most SMTP server require, or even use, certs issued by a CA?
[1]: https://letsencrypt.org/2025/05/14/ending-tls-client-authent...
mjl-
Most SMTP traffic is encrypted nowadays, at least "opportunistically", without verification.
Only with MTA-STS enabled for the server will an SMTP client (that's delivering to an SMTP server) verify the TLS certificate against PKI (with DANE, it's verified against "self-signed" or CA certs in DNS). (I'm the developer of a mail server that sets up TLS for SMTP with MTA-STS and DANE using Let's Encrypt certificates by default).
I have never heard of any SMTP server doing TLS client certificate authentication. I'm pretty sure there's no standard for that, so it can't be a requirement for all incoming email. It could be a requirement between parties that have made agreements about that explicitly. And theoretically, some mail servers could use it as a signal of authenticity of the sender. But email has other, standardized mechanisms for that. And I suspect you might see delivery failures if you start requesting TLS client cert authentication from all SMTP clients.
btown
I imagine it's not used as an MTA-to-MTA signal, but rather for organizations where outbound messages, received by the org's SMTP server, should only be accepted when the internal sending device has a client certificate.
See, for instance: https://learn.microsoft.com/en-us/sharepoint/administration/...
Is it possible that orgs have been using Let's Encrypt to issue client certificates for devices on their network to be able to send internal emails over SMTP - to the devices of the old-school partner-level employees who won't use webmail, and to various physical devices on premises? Possibly.
The interesting thing to me is that LE wouldn't know whether this is happening, because they had been issuing combo server+client certificates with the "classic" profile, and wouldn't know which are being used for which purpose. And sure, it makes sense to separate out "tlsserver" and "tlsclient" - but why also add the punitive step of having tlsclient be a new but temporary thing that will go away in May 2026? I don't see any technical reason why they can't support tlsclient, on the new dedicated Google PKI for it, into the future.
phasmantistes
The "tlsclient" profile will not be TLSClientAuth-only: it will have both the TLSServerAuth and TLSClientAuth profiles, like the default profile does today. It will exist solely for the purpose of helping people transition off of using Let's Encrypt certificates for mTLS. If they've been unaware of these conversations, their systems will break when the TLSClientAuth EKU is removed from the default profile. That will be their wake-up call, and then they can temporarily select the "tlsclient" profile to get a brief grace period to migrate their systems before the TLSClientAuth EKU is removed entirely.
mjl-
Using tls client auth certificates for submission would make slightly more sense indeed. But who would request LE certificates to install them on desktops/phones of individuals? That sounds more complicated than managing your own client certificates.
In my mail server, accounts can use TLS client authentication with submission and imap. But only the public key in the certificate is used, to identify the account. No verification of name or before/after time. You just save the public key with an account, or remove it when you no longer want to allow it. No external CA to trust, or internal CA to run, and no automatic expiration of your connectivity.
As for LE: I think they want to keep things simple. AFAIK they are a relatively small organization. Every task they take on weighs on them. They also don't sign certificates for use with S/MIME.
rnhmjoj
> I have never heard of any SMTP server doing TLS client certificate authentication. I'm pretty sure there's no standard for that, so it can't be a requirement for all incoming email.
> I suspect you might see delivery failures if you start requesting TLS client cert authentication from all SMTP clients.
Thanks, this aligns with my understanding of things. So, this issue is probably a big nothingburger.
KennyBlanken
> Most SMTP traffic is encrypted nowadays
This is laughably and naively optimistic.
scandox
Many systems will not deliver where encryption is not present. Some systems won't deliver without a certificate issued by a public CA. And some systems won't accept an LE cert but require something called OV(organizational validation).
gruez
>Some systems won't deliver without a certificate issued by a public CA. And some systems won't accept an LE cert but require something called OV(organizational validation).
Which systems are these? Are they public email providers? Are they enterprises?
scandox
Enterprises. Porsche.com corporate email for example won't deliver without an OV.
So once you're in the business of providing any kind of general email service you eventually have to deal with it.
Edit: Porsche corporate
andrewaylett
Does anyone's mail server accept (much less trust) publicly-trusted client certs anyway?
anonymousiam
The headline is misleading. They're killing SMTP CLIENT authentication certificates, not SMTP SERVER authentication certificates.
soneil
I have to go figure out exactly how this works now, as I'm likely affected.
When my smtp server connects to, eg gmail's smtp server - I'd ordinarily consider my smtp server the client within the scope of that connection.
So am I supposed to present a tlsclient EKU within outbound connections and tlsserver to incoming connections?
deepersprout
I still don't understand what this breaks. I use a LE certificate for my smtp service, but as I understand it, other mail servers don't connect to it using a client cert, they just check that the cert deleivered is trusted. Or am I missing something?
Does this break some custom setup?
samgranieri
Let’s say I want to be in full control of my own email. I buy a domain, set things up securely, and use let’s encrypt to automate setting up a TLS cert.
Let’s say I’m not using something like Caddy which does all this for you, I’m using something like a systemd timer to get that new cert and reload nginx and my smtp server.
This ostensibly should still work next year like it does now, no?
FWIW, I’ve never even heard us using a tls client certificate for smtp connections.
londons_explore
I assume the reasoning for the policy change is that allowing a single certificate to be used for many different uses puts a greater risk of the certificate private key being leaked.
They don't want your insecure mail server software to put your secure web server at risk.
its-summertime
That's not whats happening, its the root certificates that the change applies to, e.g. lets encrypt, regardless of their views, can no longer use the same infrastructure to sign certs for anything other than TLS Server Authentication, lest they wish to see google's ire.
dandanio
If you can't secure your mail server, you certainly can't secure your web server. Letsencrypt, please rethink your decision!
arccy
most smtp servers don't use client certs, there's almost nothing that requires their clients to use client cert auth.
mail servers will continue working along just fine.
dlgeek
They don't have a choice - the decision comes from Chrome's root program and if they don't comply, LetsEncrypt would be distrusted by Chrome.
Attrecomet
Is it really that clear that Google has more power here? Whom would users blame if suddenly half their pages are falsely accused of being "untrusted"? Probably the browser, not LE, right?
kbolino
Given that this is just due to a Chrome Root Store policy, it seems like a possible solution is to maintain two PKI root stores, one for browsers and one for servers. The server one can be a superset of the browser one, adding CAs that allow client auth. This way, you could request a client certificate from Let's Encrypt that works everywhere except a browser.
bigbuppo
Specifically this... the members of the CA/Browser Forum cartel have no idea how certificates are actually used in the real world, and even admit that when they all agreed to lower the maximum duration for certificates to 47 days.
arccy
smtp servers shouldn't have been doing this anyway...
the pki separation is good.
devrandoom
Why?
arccy
For a server auth cert, you validate that the thing you connect to has a cert for the same name.
For a client cert issued by web pki, all you know is that they've somehow obtained a cert for some name, you don't know if it's legit or not, since it doesn't come from connecting to the name. So kind of useless for trust.
samgranieri
How would this affect s-mime, if anyone is still using that? If I want to send a really secure message that only the intended recipient can read, I’d use signal or sign and encrypt the message with GPG
jamespo
I don't see why anyone wouldn't issue certificates from a private CA for this use case.
The link is to a random Mastodon post ranting about the change. I think it would be better if it linked to the actual blog post from Let's Encrypt: https://letsencrypt.org/2025/05/14/ending-tls-client-authent...