CA/Browser Forum
Home » All CA/Browser Forum Posts » 2024-12-19 Minutes of the Server Certificate Working Group

2024-12-19 Minutes of the Server Certificate Working Group

Attendance

Aaron Poulsen (Amazon), Adam Jones (Microsoft), Adriano Santoni (Actalis S.p.A.), Andrea Holland (VikingCloud), Ben Wilson (Mozilla), Brianca Martin (Amazon), Bruce Morton (Entrust), Chris Clements (Google), Dean Coclin (DigiCert), Dimitris Zacharopoulos (HARICA), Dustin Hollenback (Microsoft), Enrico Entschew (D-TRUST), Hogeun Yoo (NAVER Cloud Trust Services), Inaba Atsushi (GlobalSign), Iñigo Barreira (Sectigo), Johnny Reading (GoDaddy), Jos Purvis (Fastly), Kateryna Aleksieieva (Asseco Data Systems SA (Certum)), Lucy Buecking (IdenTrust), Luis Cervantes (SSL.com), Lynn Jeun (Visa), Mahua Chaudhuri (Microsoft), Marcelo Silva (Visa), Mark Nelson (IdenTrust), Martijn Katerbarg (Sectigo), Michelle Coon (OATI), Mrugesh Chandarana (IdenTrust), Nargis Mannan (VikingCloud), Nate Smith (GoDaddy), Nome Huang (TrustAsia), Paul van Brouwershaven (Entrust), Peter Miskovic (Disig), Rebecca Kelly (SSL.com), Roman Fischer (SwissSign), Sandy Balzer (SwissSign), Scott Rea (eMudhra), Stephen Davidson (DigiCert), Steven Deitte (GoDaddy), Tadahiko Ito (SECOM Trust Systems), Tathan Thacker (IdenTrust), Tim Callan (Sectigo), Tobias Josefowitz (Opera Software AS), Wayne Thayer (Fastly), Wendy Brown (US Federal PKI Management Authority), Yamian Quintero (Microsoft).

Note Well

Dimitris read the note well

Review Agenda

Dean requests we add a topic regarding Cloud-based CAs for a question that come through on the questions list.

Approval of minutes

  • December 5 minutes are not yet ready.

Membership applications

  • Membership Application for VIDA as a Certificate Authority They do not appear to be a root store member yet. As such they are approved not as. Certificate Issuer but a Probationary Member.

Github issue triage

Issue 515 - “Government Entity” Subscribers should be allowed to use a registration number in the serialNumber field.

  • The ballot language looks good. HARICA and Mozilla would be willing to endorse Issue 519 - The BR and Delegated OCSP responder signing certificates
  • Section 7.1.2.8.1 could be modified to include some expected validity period for OCSP responder certificates
  • Try to get some input from CAs about the maximum validity of their OCSP responder certificates
  • Keeping the issue open until someone decides to take ownership and drive to a ballot Issue 520 - Clarify Revocation Codes for Intermediate CAs
  • Recommendation: Create two subsections in order to specify which revocation reasons are allowed for revoked CA Certificates and end-entity Certificates
  • Update section 7.2.2 for improved clarity.
  • Issue assigned to Ben for followup Issue 523 - Update all “http” to “https” in the TLS BRs
  • Included in the upcoming clean-up ballot Issue 524 - Conformance to the latest version of the BR is a MUST
  • Mozilla thinks the entire “Implementer’s Note” should be deleted from section 8. Issue 525 - Update NCSSRs references
  • This will need to be handled for alignment with other Working Group Baseline Requirement documents Issue 526 - Clean up usage of the “Certificate Profile” Defined Term
  • Deferred to another Teleconference where Tim H. and Corey will be present Issue 527 - Update reference related to ETSI TS 102 042
  • Already removed in the upcoming cleanup ballot in 1.6.3
  • Martijn will add it to the Implementer’s Note in section 8. Issue 530 - Update reference related to FIPS 186-4
  • Part of the cleanup ballot Issue 531 - Update reference related to ISO 21188:2006
  • Part of the cleanup ballot

Cloud-based CAs question on questions list

Tim (Sectigo) injected that while this is an interesting idea, Sectigo has in the past investigated this as an option and deemed it to not be possible now.

Dimitris adds that the NSWG has a subgroup who are dealing with cloud based options for CAs. The NSR group might be a good start to prepare a response.

Dustin added that indeed they agree it currently is not possible

Ballot Status

  • SC-80 - WHOIS – Has completed
  • SC-81 – Reuse and Validity term reduction - Ongoing discussion on the public list
  • SC-82 – CA Assisted DCV - Ongoing discussion on the public list and looking towards a new ballot in the next few weeks
  • SC-83 – Winter cleanup – In discussion period

Any Other Business

We will skip the January 2nd meeting.

Next call

January 16, 2025

Adjourn

Meeting adjourned.

Latest releases
Server Certificate Requirements
BRs/2.1.2 SC-080 V3: Sunset the use of WHOIS to identify Domain Contacts and relying DCV Methods - Dec 16, 2024

Ballot SC-080 V3: “Sunset the use of WHOIS to identify Domain Contact… (https://github.com/cabforum/servercert/pull/560) Ballot SC-080 V3: “Sunset the use of WHOIS to identify Domain Contacts and relying DCV Methods” (https://github.com/cabforum/servercert/pull/555)

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.8 - Ballot SMC010 - Dec 23, 2024

This ballot adopts Multi-Perspective Issuance Corroboration (MPIC) for CAs when conducting Email Domain Control Validation (DCV) and Certification Authority Authorization (CAA) checks for S/MIME Certificates. The Ballot adopts the MPIC implementation consistent with the TLS Baseline Requirements. Acknowledging that some S/MIME CAs with no TLS operations may require additional time to deploy MPIC, the Ballot has a Compliance Date of May 15, 2025. Following that date the implementation timeline described in TLS BR section 3.2.2.9 applies. This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Ashish Dhiman (GlobalSign) and Nicolas Lidzborski (Google).

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).