<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:DengXian;
panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"\@DengXian";
panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
{font-family:-moz-fixed;
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.EmailStyle19
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal">Entrust votes Yes to ballot SC39.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Bruce.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<div style="border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b>From:</b> Servercert-wg <servercert-wg-bounces@cabforum.org>
<b>On Behalf Of </b>Neil Dunbar via Servercert-wg<br>
<b>Sent:</b> Tuesday, February 2, 2021 9:29 AM<br>
<b>To:</b> servercert-wg@cabforum.org<br>
<b>Subject:</b> Re: [Servercert-wg] VOTING BEGINS: Ballot SC39v3: Definition of Critical Vulnerability<o:p></o:p></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p>Resend: adding the ballot title to the mail thread.<o:p></o:p></p>
<div>
<p class="MsoNormal">On 02/02/2021 14:15, Neil Dunbar via Servercert-wg wrote:<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"-moz-fixed",serif">Colleagues,
<br>
<br>
This begins the voting period for ballot SC39v3: Definition of Critical Vulnerability.<br>
<br>
The following motion has been proposed by Neil Dunbar of TrustCor and endorsed by Ben Wilson (Mozilla) and Corey Bonnell (DigiCert).
<br>
<br>
-- MOTION BEGINS -- <br>
<br>
This ballot modifies the “Network and Certificate System Security Requirements” based on Version 1.5.
<br>
<br>
Under the section “Definitions”: <br>
<br>
Remove the current definition: <br>
<br>
Critical Vulnerability: A system vulnerability that has a CVSS score of 7.0 or higher according to the NVD or an equivalent to such CVSS rating (see
<a href="https://urldefense.com/v3/__http:/nvd.nist.gov/home.cfm__;!!FJ-Y8qCqXTj2!O-WfKf2n6L0z5KCTGJUlEEGCaOpOIHkLlxJ8GI7Cij86SVwjf4dUPBHDRfkor1co4t8$">
http://nvd.nist.gov/home.cfm</a>), or as otherwise designated as a Critical Vulnerability by the CA or the CA/Browser Forum.<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"-moz-fixed",serif"><br>
Insert a new definition: <br>
<br>
Critical Vulnerability: A system vulnerability that has a CVSS v2.0 score of 7.0 or higher according to the NVD or an equivalent to such CVSS rating (see
<a href="https://urldefense.com/v3/__https:/nvd.nist.gov/vuln-metrics/cvss__;!!FJ-Y8qCqXTj2!O-WfKf2n6L0z5KCTGJUlEEGCaOpOIHkLlxJ8GI7Cij86SVwjf4dUPBHDRfkos7XWOlY$">
https://nvd.nist.gov/vuln-metrics/cvss</a>), or as otherwise designated as a Critical Vulnerability by the CA or the CA/Browser Forum.
<br>
<br>
-- MOTION ENDS -- <br>
<br>
* WARNING *: USE AT YOUR OWN RISK. THE REDLINE BELOW IS NOT THE OFFICIAL VERSION OF THE CHANGES (CABF Bylaws, Section 2.4(a)):
<br>
<br>
A comparison of the changes can be found at: <br>
<br>
<a href="https://urldefense.com/v3/__https:/github.com/cabforum/servercert/compare/2b7720f...neildunbar:61fd381?diff=split__;!!FJ-Y8qCqXTj2!O-WfKf2n6L0z5KCTGJUlEEGCaOpOIHkLlxJ8GI7Cij86SVwjf4dUPBHDRfkoLVEA4II$">https://github.com/cabforum/servercert/compare/2b7720f...neildunbar:61fd381?diff=split</a>
<br>
<br>
This ballot proposes one Final Maintenance Guideline. <br>
<br>
The procedure for approval of this ballot is as follows: <br>
<br>
Vote for approval (7 days)<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:10.5pt;font-family:"-moz-fixed",serif"><br>
Start Time: 2020-02-02 1700 UTC <br>
End Time: 2020-02-09 1700 UTC<br>
<br>
Regards, <br>
<br>
Neil <o:p></o:p></span></p>
</div>
</blockquote>
</div>
</body>
</html>