Let's Encrypt offering S/MIME has been discussed repeatedly both here and on other forums and social media. The discussion here[1][2][3][4] and elsewhere[5] has touched many aspects of S/MIME. Those aspects combined, LE's stance in the past seems to have been that it's not worth doing.
To me that seems like a mistake, possibly a self-fulfilling one.
The situation with S/MIME right now is that it's, in my opinion, very similar to what HTTPS was ten years ago, or a bit like Ed25519 HTTPS certificates are right now[6].
Lack of a signature is fine[7], acquiring a certificate is expensive, often insecure[8] and laborious. All that while e-mail is often plagued by integrity and confidentiality guarantees. Some of it though can't be fixed by S/MIME, it's certainly not perfect.
When we look at the DV equivalent, "address-validated" certificates, they have the potential to significantly alleviate a bunch of risks for end-users. Without the issues that also once plagued HTTPS deployment. More on that in a later paragraph.
Yes, there absolutely are other technologies like BIMI[9], TLS[10], DMARC[11], SPF[12], DKIM[13], ARC[14] and GPG[15]/PGP[16] that touch and try to secure some aspect or other in the massive intricate system that is e-mail today. There is overlap, dependencies and there's duplication, but in the end, all but the last do what S/MIME intends to do. (I wouldn't dwell long on GPG or e-mail replacements here because they have their, usually bigger, obstacles.)
S/MIME is in a situation where it's unlikely to go anywhere soon, entire countries (yes, literally!) have given people S/MIME certificates, but it's still a relatively niche thing worldwide. Mostly due to the reasons listed above the previous paragraph. Leaving most end-users at the whims of their e-mail provider or enterprise pricing.
Support by LE would mean that e-mail clients (both web and native) have a better reason to support it. Quick ACME request during client setup, why not? Combining previous points, it could mean that end-users and mail clients can start expecting signatures ("Hey, this person has previously signed all their messages and you trust the key, are you sure this new unsigned message is ok?"). When we combine it with new tech such as Certificate Transparency (though, with modifications), it would make it significantly more annoying to forge addresses.
Let's Encrypt is in a position to securely provide generally-available, low-cost and easy-to-use certificates. It absolutely would have a large and prolonged impact on the entire e-mail ecosystem and end-user security, it absolutely should be considered.
-
https://community.letsencrypt.org/t/153
↩︎ -
https://community.letsencrypt.org/t/8351]^[https://community.letsencrypt.org/t/80160
↩︎ -
https://community.letsencrypt.org/t/95281
↩︎ -
https://community.letsencrypt.org/t/150227
↩︎ -
https://news.ycombinator.com/item?id=19795378
↩︎ -
Which aren't provided by LE, because CA/B doesn't allow, because there's no point to allow something HSM's don't support, because no large CA or CA/B forum need it, repeat ad infinitum ↩︎
-
It's unfortunately not uncommon that e-mail is sent without transport encryption not to mention SPF, DKIM and DMARC by some providers ↩︎
-
Leaf certificate keys are generated by the CA ↩︎
-
https://en.wikipedia.org/wiki/Brand_Indicators_for_Message_Identification
↩︎ -
https://en.wikipedia.org/wiki/Transport_Layer_Security
↩︎ -
https://en.wikipedia.org/wiki/DMARC
↩︎ -
https://en.wikipedia.org/wiki/Sender_Policy_Framework
↩︎ -
https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail
↩︎ -
https://en.wikipedia.org/wiki/Authenticated_Received_Chain
↩︎ -
https://en.wikipedia.org/wiki/GNU_Privacy_Guard
↩︎ -
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
↩︎