[Cscwg-public] Voting Begins: Ballot CSC-8 v3: Update to Revocation response mechanisms. key protection for EV certificates, and clean-up of 11.2.1 & Appendix B
Bruce.Morton at entrust.com
Mon Mar 29 14:44:14 UTC 2021
Entrust votes Yes to ballot CSC-8.
From: Cscwg-public <cscwg-public-bounces at cabforum.org> On Behalf Of Ian McMillan via Cscwg-public
Sent: Thursday, March 25, 2021 8:50 PM
To: cscwg-public at cabforum.org
Subject: [EXTERNAL] [Cscwg-public] Voting Begins: Ballot CSC-8 v3: Update to Revocation response mechanisms. key protection for EV certificates, and clean-up of 11.2.1 & Appendix B
WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
Ballot CSC-8 v3: Update to Revocation response mechanisms. key protection for EV certificates, and clean-up of 11.2.1 & Appendix B
Purpose of this ballot:
Address the changes needed in the Baseline Requirement for the Issuance and Management of Publicly-Trusted Code Signing Certificates v2.2 for:
1. Making OCSP optional with CRLs being required (13.2.1, 13.2.2, Appendix B: 3C, 5C)
2. Added Common Criteria EAL 4+ to the supported key protection crypto modules for EV certificates in light of support for RSA 3072 keys (16.3.2)
3. Clean up of Appendix B[3C] & [5C] (AIA value requirements) and section 11.2.1 contradiction with RFC3161
In Appendix B, it was noted that the requirements for the Timestamping (5C) and Code Signing (3C) certificates had AIA value requirements to include the root certificate URL, but that should be the issuing CA URL. This has been included in this ballot.
Corey Bonnell noted a contradiction in the section 11.2.1 regarding Timestamp in the clause “and appends it own Timestamp Certificate” is an unconditional requirement for a timestamp response to include the TSA certificate chain, but this conflicts with RFC3161 making this clause a conditional requirement based on the certReq field (missing or set to false). This clean up has the clause removed from section 11.2.1.
The following motion has been proposed by Ian McMillan of Microsoft, and endorsed by Dimitris Zacharopoulos of HARICA and Bruce Morton of EnTrust.
--- MOTION BEGINS ---
This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly‐Trusted Code Signing Certificates" version 2.2 according to the attached redline.
--- MOTION ENDS ---
The procedure for approval of this ballot is as follows:
Discussion (7 days)
Start Time: 2021-03-18, 17:30 Eastern Time (US)
End Time: not before 2021-03-25, 17:30 Eastern Time (US)
Vote for approval (7 days)
Start Time: 2021-03-25, 17:30 Eastern Time (US)
End Time: 2021-04-01, 17:30 Eastern Time (US)
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Cscwg-public