CA/Browser Forum
Home » All CA/Browser Forum Posts » Ballot SMC07: Align Logging Requirement and Key Escrow clarification

Ballot SMC07: Align Logging Requirement and Key Escrow clarification

The Intellectual Property Review (IPR) period for Ballot SMC07 (Align Logging Requirement and Key Escrow clarification) has completed. No IPR Exclusion Notices were filed, and the ballot is adopted as of July 15, 2024.

The new S/MIME BR v.1.0.5 have been published to the CABF public website in accordance with the Bylaws: https://cabforum.org/uploads/CA-Browser-Forum-SMIMEBR-1.0.5.pdf

IPR Review of Ballot SMC07: Align Logging Requirement and Key Escrow clarification

This Review Notice is sent pursuant to Section 4.1 of the CA/Browser Forum’s Intellectual Property Rights Policy (v1.3). This 30-day Review Period is for the Final Maintenance Guideline that is attached to this Review Notice.

Ballot for Review: Ballot SMC07, redline at https://cabforum.org/posts/2024/2024-06-12-SMCWG-ballot-SMC07/CA-Browser-Forum-SMIMEBR-1.0.5-redline.pdf

Start of Review Period: June 12, 2024

End of Review Period: 2359 UTC on July 12, 2024

Please forward a written notice to exclude Essential Claims by email to smcwg-public@cabforum.org and a copy to the CA/B Forum public mailing list public@cabforum.org before the end of the Review Period.

See current version of CA/Browser Forum Intellectual Property Rights Policy for details. See also https://cabforum.org/ipr-policy/. An optional format for an Exclusion Notice is available at https://cabforum.org/wp-content/uploads/Template-for-Exclusion-Notice.pdf.

Results of Ballot SMC07: Align Logging Requirement and Key Escrow clarification

The voting period for “Ballot SMC07: Align Logging Requirement and Key Escrow clarification” has completed, and the ballot has passed.

Voting Results

Certificate Issuers 15 votes total, with no abstentions:

  • 15 Issuers voting YES: Asseco Data Systems SA (Certum), DigiCert, D-TRUST, eMudhra, Entrust, HARICA, IdenTrust, Logius PKIoverheid, OISTE Foundation, Sectigo, SSL.com, SwissSign, Telia Company, TWCA, VikingCloud
  • 0 Issuers voting NO
  • 0 Issuers ABSTAIN

Certificate Consumers 2 votes total, with no abstentions:

  • 2 Consumers voting YES: Mozilla, rundQuadrat
  • 0 Consumers voting NO
  • 0 Consumers ABSTAIN

Bylaws Requirements

  1. Bylaw 2.3(f) requires:
  • A “yes” vote by two-thirds of Certificate Issuer votes and by 50%-plus-one of Certificate Consumer votes. Votes to abstain are not counted for this purpose. This requirement was MET for Certificate Issuers and MET for Certificate Consumers.
  • At least one Certificate Issuer and one Certificate Consumer Member must vote in favor of a ballot for the ballot to be adopted. This requirement was MET.
  1. Bylaw 2.3(g) requires that a ballot result only be considered valid when “more than half of the number of currently active Members has participated”. The number of currently active Voting Members is the average number of Voting Member organizations that have participated in the previous three meetings. Votes to abstain are counted in determining quorum. The quorum was 7 for this ballot. This requirement was MET.

This ballot now enters the 30-day IP Rights Review Period to permit members to review the ballot for relevant IP rights issues. The IP Rights Review Period ends at 2359 UTC on July 12, 2024.

Ballot SMC07: Align Logging Requirement and Key Escrow clarification

Summary:

This ballot aims to clarify what data needs to be logged as part of the “Firewall and router activities” logging requirement in the S/MIME Baseline Requirements and align with a recent update within the TLS BRs.

This ballot additionally aims to clarify that maximum certificate validity periods do not affect maximum key escrow duration periods.

This ballot is proposed by Martijn Katerbarg (Sectigo) and endorsed by Stephen Davidson (DigiCert) and Tom Zermeno (SSL.com).

— Motion Begins —

This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted S/MIME Certificates" (“S/MIME Baseline Requirements”), based on Version 1.0.4.

MODIFY the Baseline Requirements as specified in the following Redline: https://github.com/cabforum/smime/compare/342d850070aadeba79ae74e5dce057729b8bc147...640c8787d8f31db8d36269d0a10b424af6b077fc

— Motion Ends —

This ballot proposes a Final Maintenance Guideline. The procedure for approval of this ballot is as follows:

Discussion (at least 7 days)

• Start time: 2024-05-24 12:30:00 UTC

• End time: not before 2024-06-05 12:30:00 UTC

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.6 - Ballot SMC08 - Aug 29, 2024

This ballot sets a date by which issuance of certificates following the Legacy generation profiles must cease. It also includes the following minor updates: Pins the domain validation procedures to v 2.0.5 of the TLS Baseline Requirements while the ballot activity for multi-perspective validation is concluded, and the SMCWG determines its corresponding course of action; Updates the reference for SmtpUTF8Mailbox from RFC 8398 to RFC 9598; and Small text corrections in the Reference section

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).