CA/Browser Forum
Home » All CA/Browser Forum Posts » 2019-09-05 Minutes of the CA/Browser Forum Teleconference

2019-09-05 Minutes of the CA/Browser Forum Teleconference

Attendees (in alphabetical order)

Ben Wilson (Digicert), Bruce Morton (Entrust Datacard), Chris Kemmerer (SSL.com), Daniela Hood (GoDaddy), Dean Coclin (Digicert), Dimitris Zacharopoulos (HARICA), Doug Beattie (GlobalSign), Dustin Hollenback (Microsoft), Gordon Bock (Microsoft), Janet Hines (SecureTrust), Jeannie Rissman (Network Solutions), Joanna Fox (GoDaddy), Jos Purvis (Cisco Systems), Kenneth Myers (US Federal PKI Management Authority), Li-Chun Chen (Chunghwa Telecom), Mads Henriksveen (Buypass AS), Michelle Coon (OATI), Mike Reilly (Microsoft), Neil Dunbar (TrustCor Systems), Niko Carpenter (SecureTrust), Rich Smith (Sectigo), Robin Alden (Sectigo), Ryan Sleevi (Google), Tim Callan (Sectigo), Timo Schmitt (SwissSign), Tobias Josefowitz (Opera Software AS), Trevoli Ponds-White (Amazon), Wayne Thayer (Mozilla), Wendy Brown (US Federal PKI Management Authority).

Minutes

1. Roll Call

The Chair took attendance.

2. Read Antitrust Statement

The Antitrust Statement was read.

3. Review Agenda

No changes to the agenda.

4. Approval of minutes from previous teleconference

The minutes from the previous teleconference were approved and will be circulated to the public list.

5. Forum Infrastructure Working Group update

Jos provided the update. He will send an request to update meeting days/times because of some conflicts by participants. The WG has a draft ballot to re-charter the WG into a Forum Subcommittee. The WebEx situation was also resolved with the assistance of HARICA. Jos would check with the WebEx team if everything is in order.

Dean asked if we should switch to WebEx for the bi-weekly teleconference calls because he was experiencing some difficulties with Turbobridge web access. Other members did not have issues with Turbobridge and suggested using Skype to call the Turbobridge gateway. We can revisit this in the future if more members have difficulties with Turbobridge.

6. Code Signing Working Group update

Dean mentioned that the Code Signing WG discussed merging newly approved CS with EV CS document, because there is significant overlap. There was some discussion about audits around that. Invitations will be sent to auditors for the code signing meetings. Moving up SHA1 prohibition but there are legacy applications that need SHA1. It was discussed to move the original prohibition from January 2021 to May 2020. Working on a cleanup ballot.

A spreadsheet with contact information was created so that malware companies can use contact information for CAs that issue code signing certificates, even though this information is published in the CAs CP/CPS.

7. Follow-up on new S/MIME WG Charter

No update.

8. Any Other Business

Dean reminded Members that we now have 43 attendees and if anyone plans to attend F2F 48 and 49 to signup and update the participant tables on the wiki so that the hosts can plan ahead.

Dimitris and Dean said we should start working on the agenda for the F2F by the next meeting. We also don’t have any guest speakers for F2F 48 and perhaps we could find speakers that could connect remotely.

9. Next call

September 19, 2019 at 11:00 am Eastern Time.

Adjourned

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.6 - Ballot SMC08 - Aug 29, 2024

This ballot sets a date by which issuance of certificates following the Legacy generation profiles must cease. It also includes the following minor updates: Pins the domain validation procedures to v 2.0.5 of the TLS Baseline Requirements while the ballot activity for multi-perspective validation is concluded, and the SMCWG determines its corresponding course of action; Updates the reference for SmtpUTF8Mailbox from RFC 8398 to RFC 9598; and Small text corrections in the Reference section

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).