CA/Browser Forum
Home » All CA/Browser Forum Posts » 2026-03-26 Minutes of the Server Certificate Working Group

2026-03-26 Minutes of the Server Certificate Working Group

Minutes:

Server Cert Working Group – 032626

Begin Recording - Roll Call

Recording started

Read note-well

Dimitris read the note-well

Review of Agenda

No changes

Minutes approval

  • February 26, 2026 (Draft minutes have not been distributed yet)
  • F2F#67 March 10, 2026 (Draft minutes have not been distributed yet)

Membership applications

None

Ballot Status - Current status of Ballots:

This is the latest status of ballots since the last meeting.

In Discussion Period

· None

In Voting Period

· None

Under IPR review

· SC095: Clean-up 2025 (IPR Review ends 2026-03-29 15:00:00 UTC) - This will unblock the next set of draft ballots underway

Cleared IPR review, new Guidelines

· None

Draft / Under Consideration

· SC087: Registration Number Improvement for EV Certificates (Corey) - Will begin after new BRs are released from clean up ballot SC095.

· SC098: Process RFC 8657 CAA Parameters (Wayne) - PR title is slightly different from this; Wayne will sync them up. Chris Clements is now ballot supporter. Will submit once SC095 clears IPR. Do need to make sure ballots do not conflict with one another. Bylaws require different handling when two drafts are in flight - want to avoid that as much as possible. This touches 3.2.2.8 and 4.2.2.1 so probably ok to move forward. SC087 is for EV guidelines, so no conflict.

· SC0XX: Cleanup for ADN CNAME (Aaron) - Discussed thoroughly at the Face-to-Face; will be included in those meeting minutes.

· SC0XX: Improve Certificate Problem Reports and Clarify the Meaning of Revocation (Martijn) - One endorser, looking for second endorser; few comments on pull request to work through next week.

· SC0XX: Update Revocation timeline for errors affecting CP/CPS deviations but in accordance with the BRs (Dimitris) - Discussed at Face-to-Face. Dimitris reached out to initial supporters for feedback on whether or not to proceed. Trying to get consensus before moving forward. Also needs two endorsers yet.

· SC0XX: Modernize EVG Domain Ownership Reuse Requirement to Reference Section 3.2.2.7 (Dustin) - Dustin has obtained feedback and working through those comments yet.

Any Other Business

Dimitris brought up the size of ballot titles. Within the table that shows the ballots that are passed, long titles mess up the formatting of the table. Requested submitters to limit the size of the title as much as possible. Dimitris will check if there’s an advisable number for how markdown renders the table (approx 64 characters).

Next call: April 9, 2026

Adjourn

Dimitris: meeting adjourned.

Attendees

Adam Jones (Microsoft), Arman Asemani (Apple), Ben Wilson (Mozilla), Chris Clements (Google), Chya-Hung Tsai (TWCA), Clint Wilson (Apple), Corey Bonnell (DigiCert), Corey Rasmussen (OATI), Cynethia Brown (US Federal PKI Management Authority), Dimitris Zacharopoulos (HARICA), Dustin Hollenback (Apple), Eric Kramer (Sectigo), Gurleen Grewal (Google), Hogeun Yoo (NAVER Cloud Trust Services), Inaba Atsushi (GlobalSign), Iñigo Barreira (Sectigo), Jaime Hablutzel (OISTE Foundation), Janet Hines (SSL.com), Jeanette Snook (Visa), Jeff Ward (CPA Canada/WebTrust), John Mason (Microsoft), Jozef Nigut (Disig), Jun Okura (Cybertrust Japan), Karina Sirota (Microsoft), Karolina Ruszczyńska (Asseco Data Systems SA (Certum)), Kateryna Aleksieieva (Asseco Data Systems SA (Certum)), Lilia Dubko (CPA Canada/WebTrust), Lucy Buecking (IdenTrust), Martijn Katerbarg (Sectigo), Masaru Sakamoto (Cybertrust Japan), Matthew McPherrin (Let’s Encrypt), Michelle Coon (OATI), Mrugesh Chandarana (IdenTrust), Nome Huang (TrustAsia), Ono Fumiaki (SECOM Trust Systems), Puja Sehgal (Microsoft), Rich Smith (DigiCert), Roman Fischer (SwissSign), Sandy Balzer (SwissSign), Scott Rea (eMudhra), Sean Huang (TWCA), Stephen Davidson (DigiCert), Steven Deitte (GoDaddy), Tadahiko Ito (SECOM Trust Systems), Tathan Thacker (IdenTrust), Tim Callan (Sectigo), Tobias Josefowitz (Opera Software AS), Trevoli Ponds-White (Amazon), Wayne Thayer (Fastly), Wendy Brown (US Federal PKI Management Authority)

Latest releases
Server Certificate Requirements
SC095v3: Clean-up 2025 - Apr 2, 2026

Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.14 - Ballot SMC016 - May 5, 2026

This ballot maintains consistency between the S/MIME Baseline Requirements and the TLS Baseline Requirements with changes introduced by Ballots SC096 and SC097. Specifically, this ballot: Creates a carve-out of the logging requirements for DNSSEC specifically, stating these are not in scope. For audit purposes, change management logging is able to confirm if the appropriate controls are in effect or not. Sunsets all remaining use of SHA-1 signatures in Certificates and CRLs. It is noted that most uses of SHA-1 signatures are already deprecated by SC097. With this ballot, all unexpired Subordinate CA Certificates issuing S/MIME containing the SHA-1 signature algorithm must be revoked. This proposal does not prohibit the use of SHA-1 to generate issuerKeyHash or issuerNameHash values as currently required by RFC 5019. Includes minor formatting corrections.

Network and Certificate System Security Requirements
Version 2.0.5 (Ballot NS-008) - Jul 9, 2025

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).