CA/Browser Forum
Home » All CA/Browser Forum Posts » 2025-11-06 Minutes of the Server Certificate Working Group

2025-11-06 Minutes of the Server Certificate Working Group

  1. Begin Recording - Roll Call (as noted)
  2. Read note-well. Note well read by Dimitris
  3. Review of Agenda. Agenda reviewed, no changes
  4. Minutes approval
  • October 16, 2025, F2F#66 (Draft minutes have not been distributed yet). Nothing to review yet. Will be reviewed at future meeting.
  1. Membership applications
  • Ronald Koorn (Interested Party, individual). Approved

  • Saudi Data and Artificial Intelligence Authority (SDAIA), previously known as National Center for Digital Certification (NCDC) (Root Certificate Issuer). Question: Is this a meaningful transfer of key material and should this be reviewed again? Answer: No, this is not what happened. It’s a reorg within the Saudi government. The root is trusted by Microsoft and CCADB shows the root is now listed as SDAIA. Membership approved.

  • Digitorus (Interested Party, organization). Approved, however, applicant has asked for a standing invite to all meetings. Chairs were reminded that they have discretion to decide if an interested party should attend every meeting. A question regarding adding this exception for this applicant came up and whether we should have rules around this. Dean commented that he is working on a proposal that may accommodate this. For SCWG, Digitorus was accepted to attend all meetings.

  1. Ballot Status – see list below
  2. Any Other Business: None Next call: November 20, 2025
  3. Adjourn

Current status of Ballots

This is the latest status of ballots since the last meeting.

In Discussion Period

  • SC090: Gradually sunset all remaining email-based, phone-based, and ‘crossover’ validation methods from Sections 3.2.2.4 and 3.2.2.5 (Ryan).
  • SC091: Sunset 3.2.2.5.3 Reverse Address Lookup Validation, proposal of new DNS-based validation using Persistent DCV TXT Record for IP addresses: Now in voting period.

In Voting Period

  • SC086: Sunset the Inclusion of Address and Routing Parameter Area Names (Corey)

Under IPR review

  • SC088: Persistent DNS DCV (Slaughter) (IPR Review ends 2025-11-08 18:00:00 UTC)

Cleared IPR review, new Guidelines

  • SC092: Sunset use of Precertificate Signing CAs (BRs 2.1.8 was published)

Draft / Under Consideration

  • SC087: Registration Number Improvement for EV Certificates (Corey). No changes.
  • SC0XX: Cleanup for ADN CNAME use (Rich). Rich/Martijn will writeup some examples for review and discussion. Jacob from Let’s Encrypt (https://github.com/cabforum/servercert/pull/627) has put together an alternative to this for review. Dimitris said he’s not sure this addresses all the corner cases. Details of this proposal can be presented on the next call.
  • SC0XX: Improve Certificate Problem Reports and Clarify the Meaning of Revocation (Martijn). No progress.
  • SC0XX: Validation method in TLS Certificates (Clint). Writeup has been drafted and will be shared to the list soon. Katerina and Carolina from Asseco have volunteered to help with an upcoming cleanup ballot (2025).

Attendees

Aaron Gable (Let’s Encrypt), Aaron Poulsen (Amazon), Adam Jones

(Microsoft), Adrian Mueller (SwissSign), Alvin Wang (SHECA), Antti

Backman (Telia Company), Ben Wilson (Mozilla), Chris Clements (Google),

Clint Wilson (Apple), Daryn Wright (Apple), Dean Coclin (DigiCert),

Dimitris Zacharopoulos (HARICA), Doug Beattie (GlobalSign), Dustin

Hollenback (Apple), Enrico Entschew (D-TRUST), Gurleen Grewal (Google),

Hogeun Yoo (NAVER Cloud Trust Services), Inaba Atsushi (GlobalSign),

Jeanette Snook (Visa), Jos Purvis (Fastly), Jun Okura (Cybertrust

Japan), Kateryna Aleksieieva (Asseco Data Systems SA (Certum)), Lilia

Dubko (CPA Canada/WebTrust), Lucy Buecking (IdenTrust), Luis Cervantes

(SSL.com), Mahua Chaudhuri (Microsoft), Marco Schambach (IdenTrust),

Masaru Sakamoto (Cybertrust Japan), Matthew McPherrin (Let’s Encrypt),

Michelle Coon (OATI), Mrugesh Chandarana (IdenTrust), Nargis Mannan

(VikingCloud), Nate Smith (GoDaddy), Nicol So (CommScope), Nome Huang

(TrustAsia), Ono Fumiaki (SECOM Trust Systems), Peter Miskovic (Disig),

Rebecca Kelly (SSL.com), Rollin Yu (TrustAsia), Roman Fischer

(SwissSign), Ryan Dickson (Google), Sean Huang (TWCA), Stephen Davidson

(DigiCert), Tadahiko Ito (SECOM Trust Systems), Tathan Thacker

(IdenTrust), Thomas Zermeno (SSL.com), Tobias Josefowitz (Opera Software

AS), Wayne Thayer (Fastly), Wendy Brown (US Federal PKI Management

Authority).

Latest releases
Server Certificate Requirements
SC088v3: DNS TXT Record with Persistent Value DCV Method - Nov 11, 2025

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.12 - Ballot SMC014 - Oct 13, 2025

This ballot introduces requirements that a Certificate Issuer MUST deploy DNSSEC validation back to the IANA DNSSEC root trust anchor on all DNS queries associated with CAA record lookups performed by the Primary Network Perspective, effective March 15, 2026. The ballot is intended to maintain consistency in the S/MIME Baseline Requirements with the requirements of Ballot SC-085 which implemented identical requirements in the TLS Baseline Requirements. Note: SC-085 also introduced requirements in TLS Baseline Requirements for the use of DNSSEC in domain control validation. These requirements are automatically adopted in the S/MIME BR by the email domain control methods that include a normative reference to section 3.2.2.4 of the TLS Baseline Requirements. The draft also includes minor corrections to web links in the text. This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Client Wilson (Apple) and Ashish Dhiman (GlobalSign).

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).