CA/Browser Forum
Home » All CA/Browser Forum Posts » 2022-07-19 Minutes of the Network Security Working Group

2022-07-19 Minutes of the Network Security Working Group

CA/Browser Forum NetSec Meeting

Attendance

  • Aaron Poulsen – Amazon
  • Adam Jones – Microsoft
  • Amanda Mendieta – Apple
  • Ben Wilson – Mozilla
  • Bruce Morton – entrust
  • Clint Wilson – Apple
  • Corey Bonnell – DigiCert
  • Corey Rasmussen – OATI
  • Daryn Wright – GoDaddy
  • David Kluge – Google Trust Services
  • Iñigo Barreira – Sectigo
  • Janet Hines – SecureTrust
  • Jillian Karner – Let’s Encrypt
  • Jozef Nigut – Disig
  • Marcelo Silva – Visa
  • Prachi Jain – Fastly
  • Rebecca Kelley – Apple
  • Tobias Josefowitz – Opera
  • Tony Seymour – Comsign
  • Trevoli Ponds – Amazon Trust Services

Minutes

1. Roll Call

a. Clint Wilson took attendance

2. Read Antitrust Statement

a. Clint Wilson read the antitrust statement

3. Review Agenda

a. Cloud Services Risk Assessment Effort Update (David Kluge)

b. Zones Ballot/ Air Gapped Offline (Ben Wilson)

c. GitHub Definitions

4. Cloud Services Sub-Group Risk Assessment effort (David Kluge)

b. The Assessment Threat Modeling of the OCSP Responders (The first component of the model architecture) has been completed due to a great amount of feedback.

c. Next area of focus is the Storage of certificates or certificate database.

d. Always appreciate those who have the extra time to work on the document offline during the week.

5. Ballots (Ben Wilson)

a.No updates at this time

b.** **** Touched on briefly at end of meeting to cover definitions ******

6. GitHub Definitions

a.Reviewed and provided feedback on section that covers the 96 hour process for remediation of critical vulnerabilities.

  1. Propose a rewrite or modification to this section

b. Reviewed and Provided feedback on a section that covers “Restrict the scope of the NCSSRS”

c. Reviewed and provided feedback over “Define and modify references to “Account” #6”

d. Reviewed and provided feedback on all subjects listed in GitHub to become more familiar with each topic needing attention.

  1. Looked at in depth over “Clarify “Cannot be leveraged for a denial of service attack” #16”.

e. Group liked “Revise 2.g-k. authentication #16” to work on

f. Ben generated labels/ tags to assist with topic recognition within GitHub

Latest releases
Server Certificate Requirements
BRs/2.1.2 SC-080 V3: Sunset the use of WHOIS to identify Domain Contacts and relying DCV Methods - Dec 16, 2024

Ballot SC-080 V3: “Sunset the use of WHOIS to identify Domain Contact… (https://github.com/cabforum/servercert/pull/560) Ballot SC-080 V3: “Sunset the use of WHOIS to identify Domain Contacts and relying DCV Methods” (https://github.com/cabforum/servercert/pull/555)

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.8 - Ballot SMC010 - Dec 23, 2024

This ballot adopts Multi-Perspective Issuance Corroboration (MPIC) for CAs when conducting Email Domain Control Validation (DCV) and Certification Authority Authorization (CAA) checks for S/MIME Certificates. The Ballot adopts the MPIC implementation consistent with the TLS Baseline Requirements. Acknowledging that some S/MIME CAs with no TLS operations may require additional time to deploy MPIC, the Ballot has a Compliance Date of May 15, 2025. Following that date the implementation timeline described in TLS BR section 3.2.2.9 applies. This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Ashish Dhiman (GlobalSign) and Nicolas Lidzborski (Google).

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).