Want to highlight a helpful answer? Upvote!

Did someone help you, or did an answer or User Tip resolve your issue? Upvote by selecting the upvote arrow. Your feedback helps others! Learn more about when to upvote >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Using Mail with CaCert certificate won't work

Hello everybody!


I have a problem, I can't resolve right now. I have a CaCert.org certificate for my emails. I importetd it to my keyring, where it shows up and is marked as trusted. So no problem till this point.

Now, when I start Mail and want to write a new mail, I don't get the buttons to sign or to encrypt emails.


Thanks for your help in advance!

OS X Mavericks (10.9), 2.8 GHz Intel Core 2 Duo

Posted on Nov 15, 2013 11:02 AM

Reply
7 replies

Nov 18, 2013 8:47 PM in response to Sascha Löbbert

Sascha,


Apple Core OS developers have confirmed to me that in iOS7 and Mavericks, 1024-bit RSA root certificates are forced to be not trusted any longer.


CaCert has an ultimately weird root certificate structure where their Class 3 root, correctly made to modern standards with a 2048-bit key, is not self-signed, as a root would, but issued by their Class 1 root, with a 1024-bit key.


As things stand, therefore, CaCert is effectively broken, at least in terms of user experience, with both Mavericks and iOS.

Nov 18, 2013 9:05 PM in response to bertrandmt1

Actually, let let me amend some factual incorrections in my reply above: the issue is not around key size, which is 4096-bits for both the Class 1 root cert and the Class 3 (sub-)root cert. The issue is around the use of md5 as the hashing algorithm for the signature of the Class 1 root cert.


The end result is the same. Your cert, even though it might have been issued by the Class 3 cert, chains back all the way to the class 1 cert which, because of the MD5-RSA signature, is hard-coded as not trusted by Mavericks and iOS7, whatever your keychain settings.

Jan 7, 2014 3:21 PM in response to bertrandmt1

While it is true, than MD5 signatures should not be used for following the chain of trust, the signature of the root of the chain (AKA root certificate) is completely irrelevant since you anyway have to trust it explicitly (usually after checking its fingerprint). There is no CA that signs it.

Also: even if the Class 1 root is untrusted, why is the Class 3 not used as trust anchor, if it is _explicitly_ trusted? From there the chain of trust is secured by non-MD5 signatures.


For background:

https://wiki.mozilla.org/CA:MD5and1024

"The MD5 root certificates don’t necessarily need to be removed from NSS, because the signatures of root certificates are not validated (roots are self-signed). Disabling MD5 will impact intermediate and end entity certificates, where the signatures are validated."

Jan 8, 2014 2:19 PM in response to bertrandmt1

It was also part my mistake, I thought Sascha did trust Class 3 explicitly and I wondered, why that did not work.


However, I believe, by disabling explicitly trusted root certificates with MD5 self-signature Apple went a bit over the top... It does not increase security, but introduces additional problems and may cause less people to encrypt.

To be clear: I fully support any disabling of non-root certs signed with MD5. That was long overdue.

Jan 12, 2014 3:25 PM in response to Sascha Löbbert

Huh. Sascha, with apologies, I think this is a case of wanting to answer the question I wanted to ask, not the question you actually asked.


For signing and encrypting, you need to have imported your personal certificate, and its corresponding private key, into your keychain. If you have done so, it will show up, in the Keychain app under My Certificates and you should be able to verify it as being correctly trusted (by you). This should be in the login keychain.


Once this is confirmed, you should be able to verify that, when writing a new email, the encrypt and sign buttons appear towards the right of the composition window, right above the composition text:


User uploaded file


This all happens automatically, provided the "From" address for this account is the same as that recorded in your certificate. This is another point you should double-check.


Finally, note that you can encrypt only to recipients for whom you have a trusted certificate, as recorded in the "Certificates" section of your login keychain.


Now, I would assume there is a problem with the first part: there being your certificate and private key in the keychain, with the appropriate trust. If you can indicate what seems to be mismatched, we can continue the conversation to help drive a resolution.



Good luck!

--

Bertrand

Using Mail with CaCert certificate won't work

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.