CA/Browser Forum
Home » All CA/Browser Forum Posts » 2023-09-28 Minutes of the CA/Browser Forum Teleconference

2023-09-28 Minutes of the CA/Browser Forum Teleconference

Attendance

Aaron Gable (Let’s Encrypt), Aaron Poulsen (Amazon), Abhishek Bhat (eMudhra), Adam Clark (Visa), Adam Jones (Microsoft), Adrian Mueller (SwissSign), Andrea Holland (VikingCloud), Ben Wilson (Mozilla), Bilal Ashraf (SSL.com), Brianca Martin (Amazon), Bruce Morton (Entrust), Clint Wilson (Apple), Corey Bonnell (DigiCert), Corey Rasmussen (OATI), Daryn Wright (GoDaddy), Dean Coclin (DigiCert), Dustin Hollenback (Microsoft), Fumi Yoneda (Japan Registry Services), Hannah Sokol (Microsoft), Inaba Atsushi (GlobalSign), Iñigo Barreira (Sectigo), Jos Purvis (Fastly), Jozef Nigut (Disig), Keshava Nagaraju (eMudhra), Li-Chun Chen (Chunghwa Telecom), Lynn Jeun (Visa), Mads Henriksveen (Buypass AS), Martijn Katerbarg (Sectigo), Michelle Coon (OATI), Nargis Mannan (VikingCloud), Nate Smith (GoDaddy), Nicol So (CommScope), Paul van Brouwershaven (Entrust), Pedro Fuentes (OISTE Foundation), Rebecca Kelley (Apple), RIch Smith (DigiCert), Roman Fischer (SwissSign), Scott Rea (eMudhra), Tadahiko Ito (SECOM Trust Systems), Wayne Thayer (Fastly), Wendy Brown (US Federal PKI Management Authority), Yoshihiko Matsuo (Japan Registry Services)

Minutes

**Note-well: **Paul read the note-well.

Agenda: There were no changes to the agenda.

Approval of minutes:

  • Minutes from the August 31 Teleconference were not distributed yet.
  • Minutes from the September 14th meeting are approved.

**SCWG **– Iñigo Barreira & Corey Bonnell

  • Iñigo is still looking for endorsers for the EVG conversion to the RFC3647 format.
  • F2F topics and items have been discussed and defined for both the SCWG and validation subcommittee.

**CSCWG **– Bruce Morton

  • F2F agenda has been discussed last week.
  • Other than that, just a short meeting was held going over actual ballot status.

Forum Infrastructure Subcommittee – Jos Purvis

  • Brief meeting last week.
  • WordPress was reviewed for a vulnerability in a well-known plugin. We did not have this plugin in use.
  • We’re looking to create a markdown cheat sheet and examples page setup to have a standardized way within CA/BF.

**NetSec WG **– Clint Wilson

  • A short meeting was held preparing for the F2F meeting of next week.

**SCWG Charter Update **– Ben Wilson

  • Ben is looking for more input, and is wondering if a Certificate Consumer should be asked to maintain a list, or could state they use an external list.
  • Dimitris added that using an external list should be fine, but consumers should state how they can still add a different CA to that list.
  • This will be further discussed during the SCWG call at the F2F

Draft Agenda for F2F 60

  • No further changes are requested. The F2F agenda is accepted

Any Other Business

  • No other business.

**N****ext Meeting **– F2F 60

Adjourned

Latest releases
Server Certificate Requirements
SC095v3: Clean-up 2025 - Apr 2, 2026

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.14 - Ballot SMC016 - May 5, 2026

This ballot maintains consistency between the S/MIME Baseline Requirements and the TLS Baseline Requirements with changes introduced by Ballots SC096 and SC097. Specifically, this ballot: Creates a carve-out of the logging requirements for DNSSEC specifically, stating these are not in scope. For audit purposes, change management logging is able to confirm if the appropriate controls are in effect or not. Sunsets all remaining use of SHA-1 signatures in Certificates and CRLs. It is noted that most uses of SHA-1 signatures are already deprecated by SC097. With this ballot, all unexpired Subordinate CA Certificates issuing S/MIME containing the SHA-1 signature algorithm must be revoked. This proposal does not prohibit the use of SHA-1 to generate issuerKeyHash or issuerNameHash values as currently required by RFC 5019. Includes minor formatting corrections.

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).