CA/Browser Forum
Home » All CA/Browser Forum Posts » 2018-12-13 Minutes for Server Certificate Working Group Teleconference

2018-12-13 Minutes for Server Certificate Working Group Teleconference

Attendees (in alphabetical order)

Anna Weinberg (Apple), Ben Wilson (Digicert), Bruce Morton (Entrust Datacard), Chris Kemmerer (SSL.com), Daymion Reynolds (GoDaddy), Dimitris Zacharopoulos (HARICA), Doug Beattie (GlobalSign), Janet Hines (Trustwave), Fotis Loukos (SSL.com), Frank Corday (Trustwave), Geoff Keating (Apple), Gordon Bock (Microsoft), Inaba Atsushi (GlobalSign), India Donald (US Federal PKI Management Authority), Iñigo Barreira (360 Browser), Jeff Ward (CPA Canada/WebTrust), Joanna Fox (GoDaddy), Kirk Hall (Entrust Datacard), Mads Henriksveen (Buypass AS), Mahmud Khair (Trustwave), Marcelo Silva (Visa), Michelle Coon (OATI), Mike Reilly (Microsoft), Neil Dunbar (TrustCor Systems), Niko Carpenter (Trustwave), Peter Miskovic (Disig), Robin Alden (Sectigo), Ryan Sleevi (Google), Shelley Brewer (Digicert), Tim Callan (Sectigo), Tim Hollebeek (Digicert), Tim Shirley (Trustwave), Tomasz Nowak (Opera Software AS), Trevoli Ponds-White (Amazon), Wayne Thayer (Mozilla), Wendy Brown (US Federal PKI Management Authority).

Minutes

1. Roll Call

The Chair took attendance.

2. Read Antitrust Statement

The Chair played back the Antitrust Statement.

3. Review Agenda

Today’s Agenda was approved.

4. Approval of Minutes of previous teleconference

The minutes of November 29, 2018 teleconference were approved and will be posted to the Public list and the Public web site.

5. Validation Subcommittee Update

Ben gave the update as he was taking minutes for the last VSC meeting but didn’t have time to compile and send the minutes to the validation SC. He briefly mentioned that the Subcommittee discussed ballot SC13 and the email addresses presented in CAA and TXT DNS records. The organizationIdentifier field requested to be allowed in EV Certificates was also discussed. Nick Pope also participated on that call.

6. NetSec Subcommittee Update

Ben reported that the NetSec Subcommittee met and discussed several topics starting with the Charter. The SC discussed what would be considered minimum standards and what would be considered best practices. The previous work related to Root CA Management Systems was also discussed to see if it this approach can be expanded to other systems. Identifying the scope of work in terms of details was also mentioned, for example details related the supply chain threats or USB sticks being used, etc.

It was also suggested that we go though the variety of types of risks, rank them and see the highest risks (threat, likelihood, potential damage).

There was concern if we should divide layers for Root CAs vs other CAs vs aspects of the system and whether that would be confusing. That work would be reported back to the SCWG, but it might take a while. The SC also plans on starting to build a threat model

7. Ballot Status

Ballots in Discussion Period

Ballot SC13: CAA Contact Property and Associated E-mail Validation Methods (Tim H.) Tim will probably start the voting period on Monday Dec 17th.

Ballots in Review Period None

Draft Ballots under Consideration

Removing “any other method” for IP address (Tim H.) No comments were made.

Improvements for Method 6, website control (Tim H.) No comments were made.

8. Any Other Business

None.

9. Next call

January 10, 2019 at 11:00 am Eastern Time.

Adjourned

Latest releases
Server Certificate Requirements
SC099: Improve Recording of Validation Methods - May 19, 2026

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.14 - Ballot SMC016 - May 5, 2026

This ballot maintains consistency between the S/MIME Baseline Requirements and the TLS Baseline Requirements with changes introduced by Ballots SC096 and SC097. Specifically, this ballot: Creates a carve-out of the logging requirements for DNSSEC specifically, stating these are not in scope. For audit purposes, change management logging is able to confirm if the appropriate controls are in effect or not. Sunsets all remaining use of SHA-1 signatures in Certificates and CRLs. It is noted that most uses of SHA-1 signatures are already deprecated by SC097. With this ballot, all unexpired Subordinate CA Certificates issuing S/MIME containing the SHA-1 signature algorithm must be revoked. This proposal does not prohibit the use of SHA-1 to generate issuerKeyHash or issuerNameHash values as currently required by RFC 5019. Includes minor formatting corrections.

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).