<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
color:black;}
h2
{mso-style-priority:9;
mso-style-link:"Heading 2 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:18.0pt;
font-family:"Calibri",sans-serif;
color:black;}
h3
{mso-style-priority:9;
mso-style-link:"Heading 3 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:13.5pt;
font-family:"Calibri",sans-serif;
color:black;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
span.Heading2Char
{mso-style-name:"Heading 2 Char";
mso-style-priority:9;
mso-style-link:"Heading 2";
font-family:"Calibri",sans-serif;
color:black;
font-weight:bold;}
span.Heading3Char
{mso-style-name:"Heading 3 Char";
mso-style-priority:9;
mso-style-link:"Heading 3";
font-family:"Calibri",sans-serif;
color:black;
font-weight:bold;}
span.EmailStyle22
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<h2>Minutes of SMCWG<o:p></o:p></h2>
<p class="MsoNormal">November 10, 2021<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">These are the Approved Minutes of the Teleconference described in the subject of this message. Corrections and clarifications where needed are encouraged by reply.<o:p></o:p></p>
<h3>Attendees <o:p></o:p></h3>
<h3><span style="font-size:11.0pt;font-weight:normal">Adrian Mueller (SwissSign), Adriano Santoni (Actalis), Ali Gholami (Telia Company), Andrea Holland (SecureTrust), Andreas Henschel (D-TRUST), Atsushi Inaba (GlobalSign), Ben Wilson (Mozilla), Bruce Morton
(Entrust), Cade Cairns (Google), Chris Kemmerer (SSL.com), Clint Wilson (Apple), Corey Bonnell (DigiCert), Daniel Zens (GlobalTrust), David Kluge (Google), Dimitris Zacharopoulos (HARICA), Don Sheehy (WebTrust), Eusebio Herrera (Camerfirma), Fotis Loukos
(Google), India Donald (Federal PKI), Inigo Barreira (Sectigo), Janet Hines (SecureTrust), Joanna Fox (TrustCor), Juan Ángel Martin (Camerfirma), Mads Henriksveen (BuyPass), Matthias Wiedenhorst (ACAB'c), Mauricio Fernandez (TeleTrust), Morad Abou Nasser
(TeleTrust), Mrugesh Chandarana (IdenTrust), Patrycja Tulinska (PSW), Paul van Brouwershaven (Entrust), Pedro Fuentes (OISTE), Rebecca Kelley (Apple), Renne Rodriguez (Apple), Sebastian Schulz (GlobalSign), Stefan Selbitschka (rundQuadrat), Stephen Davidson
(DigiCert), Tadahiko Ito (SECOM Trust Systems), Tim Crawford (WebTrust), Wendy Brown (Federal PKI)<o:p></o:p></span></h3>
<h3>1. Roll Call<o:p></o:p></h3>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">The Roll Call was taken.<o:p></o:p></p>
<h3>2. Read Antitrust Statement<o:p></o:p></h3>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto">The Antitrust/Compliance Statement was read.<o:p></o:p></p>
<h3>3. Review Agenda<o:p></o:p></h3>
<h3>4. Approval of minutes from last teleconference<o:p></o:p></h3>
<p class="MsoNormal">The minutes of the October 27 teleconference were approved.
<o:p></o:p></p>
<h3>5. Discussion <o:p></o:p></h3>
<p class="MsoNormal">Stephen Davidson emphasized that drafting was underway on the S/MIME BR and encouraged WG members to review the text at
<a href="https://github.com/cabforum/smime/tree/preSBR">https://github.com/cabforum/smime/tree/preSBR</a><span style="color:windowtext"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">It was asked if pull requests would be accepted; Stephen confirmed yes but requested that they focus on specific sections rather than broad ranging edits.<o:p></o:p></p>
<p class="MsoNormal"><br>
Discussion moved to External SubCAs (that is a CA operated by an entity other than the Root):<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">- Confirmation by the CA of compliance by the External subCA with the S/MIME Baseline Requirements is required before it is allowed to commence issuing. If technically constrained this is internal to the CA, if unconstrained an external
audit is required. It was noted that root stores may require their prior approval of External subCAs, and there are moves to require additional reporting of these CAs in CCADB.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">- Technical constraints – as drafted in section 7.1.2.2 (restricting the allowed EKU) and 7.1.5 (constraints).
<o:p></o:p></p>
<p class="MsoNormal"><a href="https://github.com/cabforum/smime/blob/preSBR/SBR.md#7122-subordinate-ca-certificate">https://github.com/cabforum/smime/blob/preSBR/SBR.md#7122-subordinate-ca-certificate</a><o:p></o:p></p>
<p class="MsoNormal"><a href="https://github.com/cabforum/smime/blob/preSBR/SBR.md#715--name-constraints">https://github.com/cabforum/smime/blob/preSBR/SBR.md#715--name-constraints</a>
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Ben Wilson mentioned that discussion is occurring within the Mozilla community on related topics. Dimitris Zacharopoulos noted there was a historical discussion on mdsp whether the constraint on directoryName was required; he agreed to
send that to the list.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">- Internal audit obligations – it was agreed there will be a quarterly self-audit requirement by the CA which also extends to technically constrained External Sub-CAs (which do not require separate external audit at this time).
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">There was detailed discussion on the emphasis of internal audit on process/profile vs appropriate sampling of actual certs, it was agreed to stick close to the requirements defined in the TLS BR.
<o:p></o:p></p>
<p class="MsoNormal"><a href="https://github.com/cabforum/smime/blob/preSBR/SBR.md#87-self-audits">https://github.com/cabforum/smime/blob/preSBR/SBR.md#87-self-audits</a>
<o:p></o:p></p>
<p class="MsoNormal"><a href="https://github.com/cabforum/smime/blob/preSBR/SBR.md#88-review-of-enterprise-ra-or-technically-constrained-subordinate-ca">https://github.com/cabforum/smime/blob/preSBR/SBR.md#88-review-of-enterprise-ra-or-technically-constrained-subordinate-ca</a>
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">- External audit requirements – following a question from Bruce Morton, it was confirmed that if an External subCA is not technically constrained, it must have full external audit.
<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Clint Wilson asked to verify that verification of control of email address is always the responsibility of the CA, not allowed for Enterprise RA. Clint said there should be an approach of maximum transparency surrounding External SubCAs
and other Delegated Third Parties.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Dimitris noted that the risks of S/MIME External SubCAs are probably no different than for TLS, so internal audit by the CA of technically constrained External SubCAs should be sufficient. Stephen noted that it is believed there are more
S/MIME External SubCAs than existed for TLS. Ben noted that the S/MIME BR are a good opportunity for CAs to contribute to defining this supervision.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Fotis Loukos noted that S/MIME use cases vary from TLS so copying directly from the TLS BR may not always be best recourse to manage risks.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Future discussion will focus on identity validation for natural persons and legal entities<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">It was agreed to cancel the normal working group conference call scheduled for November 24 due to US holidays.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<h3 style="mso-margin-top-alt:1.0pt;margin-right:0in;margin-bottom:1.0pt;margin-left:0in">
6. Any Other Business<o:p></o:p></h3>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">None<o:p></o:p></p>
<h3>7. Next call<o:p></o:p></h3>
<h3><span style="font-size:11.0pt;font-weight:normal">Next call: Wednesday, December 8, 2021 at 11 a.m. US Eastern.<o:p></o:p></span></h3>
<h3><span lang="DE">Adjourned</span><o:p></o:p></h3>
<p class="MsoNormal"><span style="color:windowtext"><o:p> </o:p></span></p>
</div>
</body>
</html>