Ballot SC45: Wildcard Domain Validation
Voting Results
Certificate Issuers
22 votes total, with no abstentions
· 22 Yes votes: Actalis, Buypass, Certigna (DHIMYOTIS), Certum (Asseco), Chunghwa Telecom, D-TRUST, eMudhra, Entrust, GDCA, GlobalSign, GoDaddy, HARICA, iTrusChina, Izenpe, Kamu SM, Sectigo, SSL.com, SwissSign, Telia Company, TrustCor, SecureTrust, Visa
· 0 No Votes
· 0 Abstentions
Certificate Consumers
5 votes total, with no abstentions
· 5 Yes votes: Apple, Cisco, Google, Microsoft, Mozilla
· 0 No votes
· 0 Abstentions
Bylaw Requirements
- Bylaw 2.3(f) requires:
o A “yes” vote by two-thirds of Certificate Issuer votes and by 50%-plus-one of Certificate Consumer votes. Votes to abstain are not counted for this purpose. This requirement was MET for Certificate Issuers and MET for Certificate Consumers.
o at least one Certificate Issuer and one Certificate Consumer Member must vote in favor of a ballot for the ballot to be adopted. This requirement was MET.
- Bylaw 2.3(g) requires that a ballot result only be considered valid when “more than half of the number of currently active Members has participated”. Votes to abstain are counted in determining quorum. Half of the currently active members at the start of voting was 13, so the quorum was 14 for this ballot. This requirement was MET.
This ballot now enters the IP Rights Review Period to permit members to review the ballot for relevant IP rights issues.
Purpose of Ballot
This Ballot addresses security issues with the use of methods 3.2.2.4.6, 3.2.2.4.18, and 3.2.2.4.19 of the Baseline Requirements to authenticate an entire domain namespace. These methods rely on an HTTP based demonstration of control, which only demonstrates control over a particular host and service, rather than the entire Domain Namespace.
Effective 2021-12-01, these methods MUST NOT be used to issue Wildcard Certificates and MUST NOT be used as Authorization Domain Names for subordinate FQDNs of the validated FQDN.
Although not directly modifying the same section, this Ballot does interact with Ballot SC42: 398-day Re-use Period, and so two versions are presented, based on whether or not SC42 finishes the IP review period without issues. If SC42 is adopted, 3.2.2.4.6 does not need to change, because no past validations can be reused to issue new certificates after the effective date. However, if SC42 were to fail, 3.2.2.4.6 is also modified to keep consistent with .18 and .19.
The following motion has been proposed by Ryan Sleevi of Google and endorsed by Jos Purvis of Cisco and Dimitris Zacharopoulos of HARICA.
It can be viewed on GitHub as https://github.com/cabforum/servercert/pull/269
Motion begins
This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates” (“Baseline Requirements”), based on Version 1.7.4.
If SC42 finishes the IP Review period without issues and is adopted, MODIFY the Baseline Requirements as specified in the following Redline:
If SC42 fails to finish the IP Review period without issues and is not adopted, MODIFY the Baseline Requirements as specified in the following Redline:
Motion ends
This ballot proposes a Final Maintenance Guideline.
The procedure for approval of this ballot is as follows:
Discussion (7+ days)
Start Time: 2021-05-20 19:00:00 UTC End Time: 2021-05-27 19:00:00 UTC
Vote for approval (7 days)
Start Time: 2021-05-27 19:00:00 UTC End Time: 2021-06-03 19:00:00 UTC