CA/Browser Forum posts
Posts by tag Ballot
Ballot CSC-7v2: Update to merge EV and Non-EV clauses
February 2, 2021 by Ben WilsonVoting has closed on this ballot and the results are as follows: CAs voting in favor (7): Actalis, DigiCert, Entrust, GDCA, GlobalSign, GoDaddy, HARICA CAs opposed: None CAs abstaining: None Certificate Consumers voting in favor (1): Microsoft Certificate Consumers opposed: None Certificate Consumers abstaining: None Therefore the ballot CSC-7 passes. Purpose of the Ballot: The CSC-2 merger of the Code Signing BRs and the EV Code Signing Guidelines was done without technical changes. The result is that we have some sections where there is different text for Non-EV and EV Code Signing certificates. In many cases there was no reason to have two different requirements. In other cases, it made sense that they both have the same requirement. There were of course some items where EV is different and these clauses were not touched for now. These items were all discussed in our bi-weekly meetings. Other minor changes were the adding in a table for document revision and history and another table for effective dates within the BRs. There were also some errors corrected from the merger.
February 2, 2021 by Ben WilsonVoting has closed on this ballot and the results are as follows: CAs voting in favor (7): Actalis, DigiCert, Entrust, GDCA, GlobalSign, GoDaddy, HARICA CAs opposed: None CAs abstaining: None Certificate Consumers voting in favor (1): Microsoft Certificate Consumers opposed: None Certificate Consumers abstaining: None Therefore the ballot CSC-7 passes. Purpose of the Ballot: The CSC-2 merger of the Code Signing BRs and the EV Code Signing Guidelines was done without technical changes. The result is that we have some sections where there is different text for Non-EV and EV Code Signing certificates. In many cases there was no reason to have two different requirements. In other cases, it made sense that they both have the same requirement. There were of course some items where EV is different and these clauses were not touched for now. These items were all discussed in our bi-weekly meetings. Other minor changes were the adding in a table for document revision and history and another table for effective dates within the BRs. There were also some errors corrected from the merger.
Ballot SC038: Alignment of Record Archival
December 16, 2020 by Ben WilsonThis ballot failed to go to a vote and failed pursuant to the Bylaws. This begins the discussion period for Ballot SC38: Alignment of Record Archival (which I circulated a little while ago). The following ballot is proposed by Neil Dunbar of TrustCor Systems and endorsed by David Kluge of Google Trust Services and Ben Wilson of Mozilla. Purpose of Ballot: After the updated language included in SC28 Sections 5.4.3 and 5.5.2 (of the BRs) could be in conflict. Section 5.5.2 requires all documentation relating to certificate requests and the verification thereof, and all Certificates and revocation thereof be retained for seven years after certificates cease to to be valid. Section 5.4.3 requires all audit logs of Subscriber Certificate lifecycle management event records be maintained for two years after the revocation or expiration of the Subscriber Certificate. These sections intersect at the retention requirements for audit logs and archived records, as they relate to subscriber certificate lifecycle events. The retention periods are in conflict as to the length of retention.
December 16, 2020 by Ben WilsonThis ballot failed to go to a vote and failed pursuant to the Bylaws. This begins the discussion period for Ballot SC38: Alignment of Record Archival (which I circulated a little while ago). The following ballot is proposed by Neil Dunbar of TrustCor Systems and endorsed by David Kluge of Google Trust Services and Ben Wilson of Mozilla. Purpose of Ballot: After the updated language included in SC28 Sections 5.4.3 and 5.5.2 (of the BRs) could be in conflict. Section 5.5.2 requires all documentation relating to certificate requests and the verification thereof, and all Certificates and revocation thereof be retained for seven years after certificates cease to to be valid. Section 5.4.3 requires all audit logs of Subscriber Certificate lifecycle management event records be maintained for two years after the revocation or expiration of the Subscriber Certificate. These sections intersect at the retention requirements for audit logs and archived records, as they relate to subscriber certificate lifecycle events. The retention periods are in conflict as to the length of retention.
Ballot Forum 16 – Election of CA/Browser Forum Vice Chair
November 1, 2020 by Ben WilsonVoting on Special Ballot Forum 16 has now closed and the ballot has passed. Results are as follow: CAs voting in favor: Actalis, Buypass, Certum (Asseco), CFCA, Chunghwa Telecom, D-TRUST, Disig, eMudhra, Entrust Datacard, Firmaprofesional, GDCA, GlobalSign, GoDaddy, HARICA, iTrusChina, Kamu SM, OATI, OISTE, SECOM, SHECA, SSL.com, TWCA, TrustCor, SecureTrust CAs voting against: None CAs voting to abstain: None Browsers voting in favor: Apple, Cisco, Google, Microsoft, Mozilla, 360 Browsers voting against: None
November 1, 2020 by Ben WilsonVoting on Special Ballot Forum 16 has now closed and the ballot has passed. Results are as follow: CAs voting in favor: Actalis, Buypass, Certum (Asseco), CFCA, Chunghwa Telecom, D-TRUST, Disig, eMudhra, Entrust Datacard, Firmaprofesional, GDCA, GlobalSign, GoDaddy, HARICA, iTrusChina, Kamu SM, OATI, OISTE, SECOM, SHECA, SSL.com, TWCA, TrustCor, SecureTrust CAs voting against: None CAs voting to abstain: None Browsers voting in favor: Apple, Cisco, Google, Microsoft, Mozilla, 360 Browsers voting against: None
Special Ballot CSCWG-5: Election of Code Signing Certificate Working Group Vice Chair
October 29, 2020 by Ben WilsonSpecial Ballot CSCWG-5: Election of Code Signing Certificate Working Group Vice Chair The following motion has been proposed by the Code Signing Certificate Working Group Chair Dean Coclin of DigiCert. Purpose of Ballot This special ballot is to confirm the new Vice Chair of the Code Signing Certificate Working Group. Motion begins In accordance with Bylaw 4.1©, Bruce Morton representing Entrust is hereby elected Vice Chair of the Code Signing Certificate Working Group for a term commencing on November 1, 2020 and continuing through October 31, 2022.
October 29, 2020 by Ben WilsonSpecial Ballot CSCWG-5: Election of Code Signing Certificate Working Group Vice Chair The following motion has been proposed by the Code Signing Certificate Working Group Chair Dean Coclin of DigiCert. Purpose of Ballot This special ballot is to confirm the new Vice Chair of the Code Signing Certificate Working Group. Motion begins In accordance with Bylaw 4.1©, Bruce Morton representing Entrust is hereby elected Vice Chair of the Code Signing Certificate Working Group for a term commencing on November 1, 2020 and continuing through October 31, 2022.
Ballot CSC-4 v1: Move deadline for transition to RSA-3072 and SHA-2 timestamp tokens
October 7, 2020 by Ben WilsonVoting on this ballot has closed. The results are below: 7 CAs voting in favor: Actalis, DigiCert, Entrust Datacard, GDCA, GlobalSign, GoDaddy, HARICA 0 CAs opposed 0 CAs abstaining 1 Certificate Consumer voting in favor: Microsoft 0 Certificate Consumers opposed 0 Certificate Consumers abstaining Therefore the ballot passes. Dean Coclin CSCWG Chair Ballot CSC-4 v1: Move deadline for transition to RSA-3072 and SHA-2 timestamp tokens Purpose of the Ballot: The current deadline for moving from RSA-2048 to RSA-3072 and from SHA-1 to SHA-2 for timestamp tokens falls on January 1, 2021, which is inconvenient due to code freezes due to the winter holidays. This ballot delays the deadline to June 1, 2021 for RSA-3072 and April 30, 2022 for SHA-2 timestamp tokens.
October 7, 2020 by Ben WilsonVoting on this ballot has closed. The results are below: 7 CAs voting in favor: Actalis, DigiCert, Entrust Datacard, GDCA, GlobalSign, GoDaddy, HARICA 0 CAs opposed 0 CAs abstaining 1 Certificate Consumer voting in favor: Microsoft 0 Certificate Consumers opposed 0 Certificate Consumers abstaining Therefore the ballot passes. Dean Coclin CSCWG Chair Ballot CSC-4 v1: Move deadline for transition to RSA-3072 and SHA-2 timestamp tokens Purpose of the Ballot: The current deadline for moving from RSA-2048 to RSA-3072 and from SHA-1 to SHA-2 for timestamp tokens falls on January 1, 2021, which is inconvenient due to code freezes due to the winter holidays. This ballot delays the deadline to June 1, 2021 for RSA-3072 and April 30, 2022 for SHA-2 timestamp tokens.
Ballot CSCWG-3: Election of Code Signing Certificate Working Group Chair
September 23, 2020 by Jos PurvisBallot ResultsVoting on Ballot CSCWG-3 has ended and the results are below: Certificate Issuers Votes in Favor: (9) Actalis, DigiCert, eMudhra, Entrust, GDCA, GlobalSign, HARICA, SSL.com, SecureTrust (former Trustwave)
September 23, 2020 by Jos PurvisBallot ResultsVoting on Ballot CSCWG-3 has ended and the results are below: Certificate Issuers Votes in Favor: (9) Actalis, DigiCert, eMudhra, Entrust, GDCA, GlobalSign, HARICA, SSL.com, SecureTrust (former Trustwave)
Ballot SC036: Election of Server Certificate Working Group Chair
September 21, 2020 by Jos PurvisBallot ResultsThe voting period for Special Ballot SC36 has ended and the Ballot has Passed. Congratulations Jos! Here are the results: Voting by Certificate Issuers 24 votes total including abstentions
September 21, 2020 by Jos PurvisBallot ResultsThe voting period for Special Ballot SC36 has ended and the Ballot has Passed. Congratulations Jos! Here are the results: Voting by Certificate Issuers 24 votes total including abstentions
Ballot FORUM-15: Election of CA/Browser Forum Chair
September 21, 2020 by Jos PurvisBallot Results The voting period for Special Ballot Forum-15 has ended and the Ballot has Passed. Congratulations Dean!
September 21, 2020 by Jos PurvisBallot Results The voting period for Special Ballot Forum-15 has ended and the Ballot has Passed. Congratulations Dean!