CA/Browser Forum

CA/Browser Forum posts

Posts by tag Ballot

    Ballot SC046: Sunset the CAA exception for DNS Operator
    June 2, 2021 by Wayne ThayerThe voting on ballot SC46 has completed, and the ballot has passed. Voting Results Certificate Issuers 17 votes total, with no abstentions
    Ballot SC044: Clarify Acceptable Status Codes
    May 1, 2021 by Wayne ThayerThe voting on ballot SC44 has completed, and the ballot has passed. Voting Results Certificate Issuers 21 votes total, with no abstentions
    Ballot SC042: 398-day Re-use Period
    April 22, 2021 by Jos PurvisVoting Results The voting on SC42v2 has completed, and the ballot has passed.
    Ballot SC043: Clarify Acceptable Status Codes
    April 8, 2021 by Ben WilsonThe voting on SC43v2 has completed, and the ballot has failed. Voting Results Certificate Issuers 8 votes total, with no abstentions
    Ballot CSC-8 v3: Update to Revocation response mechanisms. key protection for EV certificates, and clean-up of 11.2.1 & Appendix B
    April 2, 2021 by Ben WilsonThe voting period for Ballot CSC-8 has ended and the Ballot has Passed. Here are the results: Voting by Certificate Issuers – 7 votes total including abstentions – 6 Yes votes: Certum (Asseco), DigiCert, Entrust, GlobalSign, HARICA, Sectigo – 0 No votes – 1 Abstain: GoDaddy 87% of voting Certificate Issuers voted in favor. Voting by Certificate Consumers – 1 vote total including abstentions – 1 Yes votes: Microsoft – 0 No votes
    Ballot SC041: Reformatting the BRs, EVGs, and NCSSRs
    February 26, 2021 by Jos PurvisThe voting period for Ballot SC41v2 has concluded and the Ballot has Passed. Voting Results Certificate Issuers 2****1 votes total, with no abstentions
    Ballot SC037: Election of Server Certificate Working Group Vice Chair
    February 10, 2021 by Wayne ThayerThe voting period for Special Ballot SC37 has ended and the Ballot has Passed. Congratulations Wayne! Here are the results: Voting by Certificate Issuers – 20 votes total including abstentions – 20 Yes votes: Actalis, Buypass, Certum (Asseco), CFCA, Chunghwa Telecom, D-TRUST, Disig, eMudhra, Entrust Datacard, GDCA, GlobalSign, GoDaddy, HARICA, iTrusChina, Kamu SM, OATI, OISTE, SSL.com, TrustCor, SecureTrust. – 0 No votes: – 0 Abstain: 100% of voting Certificate Issuers voted in favor.
    Ballot SC309v3: Definition of Critical Vulnerability
    February 10, 2021 by Wayne ThayerThe voting period for Ballot SC39v3 has concluded and the Ballot has Passed. Voting Results Certificate Issuers 22 votes total, with no abstentions
    Ballot SC040: Security Requirements for Air-Gapped CA Systems
    February 9, 2021 by Ben WilsonThis ballot was withdrawn and/or failed to go to a vote. This is a continuation of discussion on the air-gapped CA ballot. (As noted below, this formally continues the discussion for this ballot, as of 2021-02-08 17:00 UTC. This discussion period will continue until initiation of the Voting Period (TBD) unless extended or as otherwise determined, pursuant to the CA/Browser Forum Bylaws. I renumbered the sections - 5.1 for logical security and 5.2 for physical security. I have not attempted yet to address the comments between Aaron and Ryan re: accessing the air-gapped CA for checking configuration. Maybe that section needs to remain “as is” or with clarification that a desktop review of CA configuration would be satisfactory if the air-gapped CA has not been physically touched.
    Ballot CSC-7v2: Update to merge EV and Non-EV clauses
    February 2, 2021 by Ben WilsonVoting has closed on this ballot and the results are as follows: CAs voting in favor (7): Actalis, DigiCert, Entrust, GDCA, GlobalSign, GoDaddy, HARICA CAs opposed: None CAs abstaining: None Certificate Consumers voting in favor (1): Microsoft Certificate Consumers opposed: None Certificate Consumers abstaining: None Therefore the ballot CSC-7 passes. Purpose of the Ballot: The CSC-2 merger of the Code Signing BRs and the EV Code Signing Guidelines was done without technical changes. The result is that we have some sections where there is different text for Non-EV and EV Code Signing certificates. In many cases there was no reason to have two different requirements. In other cases, it made sense that they both have the same requirement. There were of course some items where EV is different and these clauses were not touched for now. These items were all discussed in our bi-weekly meetings. Other minor changes were the adding in a table for document revision and history and another table for effective dates within the BRs. There were also some errors corrected from the merger.
    The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).