CA/Browser Forum
Home » All CA/Browser Forum Posts » 2019-09-19 Minutes of the Server Certificate Working Group

2019-09-19 Minutes of the Server Certificate Working Group

Attendees (in alphabetical order)

Ben Wilson (Digicert), Bruce Morton (Entrust Datacard), Chris Kemmerer (SSL.com), Curt Spann (Apple), Daniela Hood (GoDaddy), Devon O’Brien (Google), Doug Beattie (GlobalSign), Dustin Hollenback (Microsoft), Enrico Entschew (D-TRUST), Gordon Bock (Microsoft), Inaba Atsushi (GlobalSign), Janet Hines (SecureTrust), Joanna Fox (GoDaddy), Jos Purvis (Cisco Systems), Li-Chun Chen (Chunghwa Telecom), Mads Henriksveen (Buypass AS), Mike Reilly (Microsoft), Neil Dunbar (TrustCor Systems), Niko Carpenter (SecureTrust), Peter Miskovic (Disig), Rich Smith (Sectigo), Robin Alden (Sectigo), Tim Hollebeek (Digicert), Tobias Josefowitz (Opera Software AS), Trevoli Ponds-White (Amazon), Wayne Thayer (Mozilla).

Minutes

1. Roll Call

The Chair took attendance.

2. Read Antitrust Statement

The Antitrust Statement was read.

3. Review Agenda

No changes to the agenda.

4. Approval of minutes from previous teleconference

The minutes from the previous teleconference were approved and will be circulated to the public list.

5. Validation Subcommittee Update

Tim provided the update. Stephan from GLEIF was invited to participate on the subcommittee call to discuss about the inclusion of LEIs in Certificates. The discussion was not concluded within the hour of the call but there was a lot of progress made and may have to invite him back on a future call. He mentioned that Ryan posted the minutes and Kirk suggested some changes but there was a disagreement about some points. Tim listened to the recording and reviewed the minutes. His personal opinion was that the discussion was mostly captured in the minutes posted by Ryan, almost as a transcript which included a lot of details. Kirk proposed some important edits to the minutes which, from Tim’s quick review, appear to be accurate. He would hope people can continue that discussion and come to a conclusion about what the minutes are without him having to take any additional actions. It was a good discussion and a lot of background information was provided about how LEIs came to be. Ryan also raised some concerns about their inclusion in Certificates. As an additional comment, Tim said that it would be useful if Ryan could summarize his concerns about the use of LEI in EV Certificates and post them to the list, so that other people can address them. If there is serious ecosystem harm with this proposal, we need to discuss it so we can find possible solutions to these concerns.

Wayne mentioned that Ryan is not on the call so Tim should probably communicate this request to the list so that Ryan can see it. Both Tim and Wayne will not be available for the next validation call so Tim will have to find someone else to run the call.

6. NetSec Subcommittee Update

Ben is planning on posting an updated version of ballot SC21. The subcommittee also worked on restructuring the network security requirements and whether the compensating controls should be something like a concept that we acknowledge in the network security requirements.

7. Ballot Status

No further discussion.

Ballots in Discussion Period

None

Ballots in Voting Period

None

Ballots in Review Period

None

Draft Ballots under Consideration

Improvements for Method 6, website control (Tim H.) No additional comments _ SC20 Ballot (NSR 2): System Configuration Management_ No additional comments

SC21 Ballot (NSR 3): Log Integrity Controls (Ben) No additional comments

8. Any Other Business

No other business.

9. Next call

October 3, 2019 at 11:00 am Eastern Time.

Adjourned

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.6 - Ballot SMC08 - Aug 29, 2024

This ballot sets a date by which issuance of certificates following the Legacy generation profiles must cease. It also includes the following minor updates: Pins the domain validation procedures to v 2.0.5 of the TLS Baseline Requirements while the ballot activity for multi-perspective validation is concluded, and the SMCWG determines its corresponding course of action; Updates the reference for SmtpUTF8Mailbox from RFC 8398 to RFC 9598; and Small text corrections in the Reference section

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).