2025-03-28
New Security Requirements for HTTPS Certificate Issuance
The Certificate Authority Browser (CA/Browser) Forum has added two practices to its Baseline Requirements to enhance the security of HTTPS certificates. The first, Multi-Perspective Issuance Corroboration (MPIC), "enhances existing domain control validation methods by reducing the likelihood that routing attacks can result in fraudulently issued certificates. Rather than performing domain control validation and authorization from a single geographic or routing vantage point, which an adversary could influence as demonstrated by security researchers, MPIC implementations perform the same validation from multiple geographic locations and/or Internet Service Providers." CAs must also now use linting, which "ensures certificates are well-formatted and include the necessary data for their intended use, such as website authentication." Both new requirements took effect on March 15, 2025.
Editor's Note
The idea is to offset risks from BGP attacks used to obtain fraudulent certificates. Requester domain validation will be performed from multiple geographic locations, to offset risks of routing attacks, coupled with enhanced linting to ensure good algorithms are used and errors detected, which should increase the overall integrity of certificate issuing with nominal impact on legitimate certificate requests.

Lee Neely
These changes should be transparent to anybody requesting certificates from participating certificate authorities. So far, the more disruptive proposals, like a shortened certificate lifetime, were not implemented.

Johannes Ullrich
The CA/Browser Forum has been very slow to force improvements in validation and authorization before certificates are issued, even as 'SSL everywhere!' was trumpeted. Good to see this initiative become a requirement.

John Pescatore
Does making these procedures public improve security?
