email-reply-00 Challenge

The email-reply-00 challenge permits to get end-user S/MIME certificates, as specified in RFC 8823.

The CA must support issuance of S/MIME certificates. Let's Encrypt does not currently support it.

Warning

The support of this challenge is experimental. The implementation is only unit tested for compliance with the RFC, but is not integration tested yet. There may be breaking changes in this part of the API in future releases.

Setup and Requirements

To use the S/MIME support, you need to:

  • add the acme4j-smime module to your list of dependencies
  • make sure that BouncyCastleProvider is added as security provider

RFC 8823 requires that the DKIM or S/MIME signature of incoming mails must be checked. Outgoing mails must have a valid DKIM signature. Starting with v2.15, acme4j is able to validate and sign S/MIME verification mails. DKIM is usually done by the MTA and thus out of the scope of acme4j-smime.

Ordering

The certificate ordering process is similar to a standard domain certificate order.

However, if Identifier objects are needed, use EmailIdentifier.email() to generate an identifier for the email address you want an S/MIME certificate for.

To generate a CSR, the module provides a SMIMECSRBuilder that works similar to the standard CSRBuilder, but accepts EmailIdentifier objects.

With the SMIMECSRBuilder.setKeyUsageType(), the desired usage type of the S/MIME certificate can be selected. By default the certificate can be used both for encryption and signing. However this is just a proposal, and the CA is free to ignore it or return an error if the desired usage type is not supported.

Challenge and Response

The CA validates ownership of the email address by two components.

Firstly, the CA sends a challenge email to the email address that requested the S/MIME certificate. The subject of this email always starts with an ACME: prefix, so it can be filtered by the inbound MTA for automatic processing. After the prefix, the mail subject contains the first part of the challenge token (called "Token 1").

Secondly, the CA provides a new EmailReply00Challenge challenge that needs to be verified by the client. The challenge contains the second part of the challenge token (called "Token 2"). Both token parts are concatenated to give the full token that is required for generating the key authorization. The EmailReply00Challenge class offers methods like getToken(String part1), getTokenPart2(), and getAuthorization(String part1) for that.

The client now needs to generate a response to the request email. This is a standard mail response to the sender's address. The subject line must be kept, except of an optional Re: or a similar prefix. The mail body must contain a text/plain part that contains the wrapped key authorization string. For example:

-----BEGIN ACME RESPONSE-----
LoqXcYV8q5ONbJQxbmR7SCTNo3tiAXDfowy
jxAjEuX0=
-----END ACME RESPONSE-----

This response is sent back to the CA.

After that, the EmailReply00Challenge is triggered. The CA now has a proof of ownership of the email address, and can issue the S/MIME certificate.

Response Helper

The response process can be executed programatically, or even manually. To help with the process, acme4j-smime provides an EmailProcessor that helps you parsing the challenge email, and generate a matching response mail.

It is basically invoked like this:

Message               challengeMessage = // incoming challenge message from the CA
EmailReply00Challenge challenge        = // challenge that is requested by the CA
EmailIdentifier       identifier       = // email address to get the S/MIME cert for
javax.mail.Session    mailSession      = // javax.mail session

Message response = EmailProcessor.plainMessage(challengeMessage)
            .expectedIdentifier(identifier)
            .withChallenge(challenge)
            .respond()
            .generateResponse(mailSession);

Transport.send(response);   // send response to the CA
challenge.trigger();        // trigger the challenge

The EmailProcessor and the related ResponseGenerator offer more methods for validating and for customizing the response email, see the autodocs.

Validating S/MIME Challenge E-Mails

The EmailProcessor is able to validate challenge e-mails that were signed by the CA using S/MIME. To do so, invoke the processor like this:

Message               challengeMessage = // incoming challenge message from the CA
EmailReply00Challenge challenge        = // challenge that is requested by the CA
EmailIdentifier       identifier       = // email address to get the S/MIME cert for

Message response = EmailProcessor.signedMessage(challengeMessage)
            .expectedIdentifier(identifier)
            .withChallenge(challenge)
            .respond()
            .generateResponse();

Transport.send(response);   // send response to the CA
challenge.trigger();        // trigger the challenge

If you need more control of the signature verification process, you can use EmailProcessor.builder(). It is useful e.g. if you need to use a different truststore, or if your MTA has mangled the incoming message, so a relaxed verification is needed.