CA/Browser Forum
Home » All CA/Browser Forum Posts » 2026-01-29 Minutes of the Forum

2026-01-29 Minutes of the Forum

Minutes:

CA/Browser Forum Plenary Call, 29 January 2026

Minutes by Jos Purvis (Fastly)

Minutes

I. Meeting Logistics

Tim Callan presided over the meeting in lieu of Dean Coclin. Tim re-emphasized the contents of the note-well.

II. Working Group Summaries

  • Code-Signing Certificate Working Group: Martijn indicated there hadn’t been a meeting of the working group since the last Forum call, so there were no updates.
  • S/MIME Certificate Working Group: Martijn provided an update for the group. They met on 28 January with discussions around the ballot for mobile driver’s licenses, which will need some minor changes before becoming a formal ballot, as well as the potential impact to SMTP service that the impending separation of client-auth/server-auth in certificates might have. He also mentioned the pending ballot to remove any uses of SHA-1, which could potentially spill over into other areas such as code-signing or TLS as there are still multi-purpose CAs or subCAs that are issuing certs with SHA-1 in the chain somewhere. The S/MIME Certificate Working Group is looking to coordinate both the SHA-1 and the Client-Auth/Server-Auth changes with the other working groups, to ensure any potential impact is understood and minimized. There is also a pair of ballots around DNS exceptions and DNS logging exceptions that will likely merge into a single ballot in the future.
  • NetSec Working Group: Clint indicated the group met on Tuesday the 27th and discussed a previous proposal the group had entertained for adopting or incrementally adopting cloud services. The current iteration attempts to differentiate the operating environments for “security support systems”, which could exist in a cloud/not-physically-present environment with a risk assessment from the CA, and the actual CA infrastructure itself (root, issuing CAs, etc.), that could not exist there. The discussion was thorough and productive within the working group, and cloud service providers have been providing some guidance to the discussion as well, but the group has not yet reached any conclusions.
  • Definitions and Glossary Working Group: Tim Callan indicated the work in this space may have stalled, in that the group is more or less where they were four months ago. There’s a strong draft of changes to consider, but they need some further discussion to get this to ballot.
  • Forum Infrastructure Working Group: Jos indicated the group hadn’t met since the last Forum call.
  • Server Certificate Working Group: Dimitris summarized the discussions around cleanup ballots and which dates should be removed; the group had roughly agreed on deleting everything prior to 2024. He also mentioned discussions around the SHA-1 ballot (which has since passed) and the ADN ballot that was discussed.

Corey Bonnell supplied a summary from the Validation Subcommittee. They discussed the confusion around the change from allowing validation re-use under the ADN as opposed to the requested FQDN, and will be sending out some emails for clarification. There are some interested parties invited to discuss the CAA parameters ballot that Wayne Thayer (Fastly) proposed that the group will be following up on, and an IETF draft circulating in the LAMPS working group around CAA security.

III. Discussion Items — Current Business

Face-to-Face Meetings

Tim reminded the group that the Forum has moved to two face-to-face meetings per year, spring and fall. The March 10-12 meeting this year will be hosted in Houston, TX, US, by SSL.com; the fall meeting is scheduled for September in Vienna to be hosted by eMudhra. Ben asked for clarity regarding the dates of the September meeting; Tim volunteered to take that up with Scott Rea at eMudhra after the call.

Dimitris asked for clarity regarding the NetSec update and whether the proposed changes meant no requirement for physical security around security support systems even in cloud providers. Clint clarified that there’s a definition of “physically secure environment” tied to RFC3647 definitions and with an accompanying risk assessment from the CA, and that the proposal was that security systems would not require the RFC-3647-specific components but just the risk assessment, and that this was an initial straw-dog proposal from Corey in order to stimulate discussion around the topic; no consensus had yet been reached on the topic.

IV. New Business

There were no further new-business items. Tim adjourned the call, noting the next call would be 12 February.

Attendees

  • Aaron Gable (Let’s Encrypt)
  • Adriano Santoni (Actalis S.p.A.)
  • Alvin Wang (SHECA)
  • Antti Backman (Telia Company)
  • Ben Wilson (Mozilla)
  • Clint Wilson (Apple)
  • Corey Bonnell (DigiCert)
  • Corey Rasmussen (OATI)
  • Cynethia Brown (US Federal PKI Management Authority)
  • Daryn Wright (Apple)
  • Dimitris Zacharopoulos (HARICA)
  • Dustin Hollenback (Apple)
  • Eric Kramer (Sectigo)
  • Hogeun Yoo (NAVER Cloud Trust Services)
  • Inaba Atsushi (GlobalSign)
  • Iñigo Barreira (Sectigo)
  • Jeanette Snook (Visa)
  • John Mason (Microsoft)
  • Johnny Reading (GoDaddy)
  • Jos Purvis (Fastly)
  • Jun Okura (Cybertrust Japan)
  • Karina Sirota (Microsoft)
  • Kateryna Aleksieieva (Asseco Data Systems SA (Certum))
  • Li-Chun Chen (Chunghwa Telecom)
  • Lilia Dubko (CPA Canada/WebTrust)
  • Lucy Buecking (IdenTrust)
  • Luis Cervantes (SSL.com)
  • Luis Osses (Amazon)
  • Mahua Chaudhuri (Microsoft)
  • Marco Schambach (IdenTrust)
  • Martijn Katerbarg (Sectigo)
  • Masaru Sakamoto (Cybertrust Japan)
  • Michelle Coon (OATI)
  • Nate Smith (GoDaddy)
  • Nome Huang (TrustAsia)
  • Ono Fumiaki (SECOM Trust Systems)
  • Pedro Fuentes (OISTE Foundation)
  • Peter Miskovic (Disig)
  • Rollin Yu (TrustAsia)
  • Sándor Szőke (Microsec)
  • Scott Rea (eMudhra)
  • Sean Huang (TWCA)
  • Sven Rajala (Keyfactor)
  • Tathan Thacker (IdenTrust)
  • Thomas Zermeno (SSL.com)
  • Tim Callan (Sectigo)
  • Tobias Josefowitz (Opera Software AS)
  • Trevoli Ponds-White (Amazon)
  • Wayne Thayer (Fastly)
Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.12 - Ballot SMC014 - Oct 13, 2025

This ballot introduces requirements that a Certificate Issuer MUST deploy DNSSEC validation back to the IANA DNSSEC root trust anchor on all DNS queries associated with CAA record lookups performed by the Primary Network Perspective, effective March 15, 2026. The ballot is intended to maintain consistency in the S/MIME Baseline Requirements with the requirements of Ballot SC-085 which implemented identical requirements in the TLS Baseline Requirements. Note: SC-085 also introduced requirements in TLS Baseline Requirements for the use of DNSSEC in domain control validation. These requirements are automatically adopted in the S/MIME BR by the email domain control methods that include a normative reference to section 3.2.2.4 of the TLS Baseline Requirements. The draft also includes minor corrections to web links in the text. This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Client Wilson (Apple) and Ashish Dhiman (GlobalSign).

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).