[cabfpub] Ballot 188 - Clarify use of term "CA" in Baseline Requirements
Doug Beattie
doug.beattie at globalsign.com
Tue Feb 28 14:37:35 MST 2017
GlobalSIgn votes Yes.
> -----Original Message-----
> From: Public [mailto:public-bounces at cabforum.org] On Behalf Of Ben
> Wilson via Public
> Sent: Thursday, February 16, 2017 2:09 PM
> To: CABFPub <public at cabforum.org>
> Cc: Ben Wilson <ben.wilson at digicert.com>
> Subject: [cabfpub] Ballot 188 - Clarify use of term "CA" in Baseline
> Requirements
>
> Ballot 188 - Clarify use of term "CA" in Baseline Requirements
>
> The following motion has been proposed by Dimitris Zacharopoulos of
> HARICA and endorsed by Ben Wilson of Digicert and Tim Hollebeek of
> Trustwave.
>
> Background:
>
> The Policy Review Working Group has completed its review of the Baseline
> Requirements for purposes of clarifying use of the term "CA" and related
> terminology. The term "CA" is used in the Baseline Requirements and other
> documents to refer to "CA" as an organization or "CA" as a CA Certificate. The
> Policy Review WG decided to update the Baseline Requirements first, and
> then update the EV Guidelines and other documents so that the updated
> terms are used consistently in all CA/B Forum documents.
>
> One of the proposed changes is not related to "CA" terminology. That
> proposed change is in Section 4.9.10. Also, in section 6.1.7, some legacy
> language related to 1024-bit RSA usage from Root CA, was removed.
>
> Some incorrect references (pointing to Section 3.3.1 instead of 4.2.1) are also
> corrected in Sections 3.2.2.4 and 4.1.2
>
> In accordance with the Bylaws, a PDF with redlines to the Baseline
> Requirements as they currently exist is attached to assist your review.
>
> -- MOTION BEGINS --
>
>
> In Section 1.1 (Overview)
>
>
> * Delete the last sentence of section 1.1, which reads, "These
> Requirements are applicable to all Certification Authorities within a chain of
> trust. They are to be flowed down from the Root Certification Authority
> through successive Subordinate Certification Authorities."
> * Insert as the last sentence of section 1.1 the following: "These
> requirements are applicable to all CAs that can issue a Certificate that appears
> in a particular certificate chain from a Root Certificate that is publicly trusted.
> They are to be flowed down from a Root Certificate through successive
> Subordinate CA Certificates."
>
>
> In Section 1.6.1 (Definitions)
>
>
> * Insert a new definition for "CA Certificate" as: "A Certificate in which
> the basicConstraints field has the cA attribute set to TRUE."
> * Replace the definition of "Certificate Revocation List" with: "A
> regularly updated time-stamped list of revoked Certificates that is created
> and digitally signed by the Private Key associated with the Root CA Certificate
> or Subordinate CA Certificate that issued the revoked Certificates."
> * Replace the definition of "Certification Authority" with: "An
> organization that is responsible for the creation, issuance, revocation, and
> management of Certificates. The term applies equally to Root CA Operators
> and Subordinate CA Operators."
> * Replace the definition of "Cross Certificate" with: "A CA Certificate
> that is used to establish a trust relationship between two Root CA
> Certificates."
> * Insert a new definition for "Externally Operated Subordinate CA" as:
> "A third party Subordinate CA Operator, not the Root CA Operator or its
> Affiliate, that is in possession or control of the Private Key associated with the
> Subordinate CA Certificate."
> * Insert a new definition for "Internally Operated Subordinate CA" as:
> "A Subordinate CA Operator, operated by a Root CA Operator or its Affiliate,
> that is in possession or control of the Private Key associated with the
> Subordinate CA Certificate."
> * Replace the definition of "Issuing CA" with: "The Root CA Operator or
> the Subordinate CA Operator that is in possession or control of the Private
> Key of the "Issuer" named in a particular Certificate."
> * Replace the definition of "Key Generation Script" with: "A
> documented plan of procedures for the generation of the Key Pair to be
> associated with a CA Certificate."
> * Replace the definition of "OCSP Responder" with: "A system that
> provides Online Certificate Status Protocol responses. See also, Online
> Certificate Status Protocol."
> * Replace the definition of "Root CA" with a new definition for "Root
> CA Operator" as: "The top-level Certification Authority (i.e. an organization)
> whose CA Certificate (or associated Public Key) is distributed by Application
> Software Suppliers as a trust anchor."
> * Replace the defined term "Root Certificate" with "Root CA Certificate"
> and replace the definition with: "A CA Certificate in which the Public Key has
> been digitally signed by its corresponding Private Key."
> * Insert a new definition for "Subordinate CA Operator" as "A
> Certification Authority in possession or control of the Private Key associated
> with a Subordinate CA Certificate. A Subordinate CA Operator is either an
> Externally Operated Subordinate CA or an Internally Operated Subordinate
> CA."
> * Replace the definition for "Subordinate CA" with "Subordinate CA
> Certificate" as: "A CA Certificate that has been signed by the Private Key
> associated with a Root CA Certificate or a different Subordinate CA
> Certificate."
> * Replace the definition of "Technically Constrained Subordinate CA
> Certificate" with: "A Subordinate CA Certificate which uses a combination of
> Extended Key Usage settings and Name Constraint settings to limit the scope
> within which the Subordinate CA Certificate may issue Subscriber or
> additional Subordinate CA Certificates."
>
>
> In Section 1.6.2 (Acronyms)
>
>
> * Insert a new acronym EKU --> "Extended Key Usage"
>
>
> In Section 3.2.2.4 (Validation of Domain Authorization or Control)
>
>
> * In the third paragraph, replace "Section 3.3.1" with "Section 4.2.1".
>
>
> In Section 3.2.2.4.6 (Agreed-Upon Change to Website)
>
>
> * In the 2nd paragraph, replace "Section 3.3.1 of these Guidelines" with
> "Section 4.2.1 of this document".
>
>
> In Section 4.1.2 (Enrollment Process and Responsibilities)
>
>
> * In the 3rd paragraph, replace "Section 3.3.1" with "Section 4.2.1".
>
>
> In Section 4.9.1.1 (Reasons for Revoking a Subscriber Certificate)
>
>
> * Replace subsection 13 with: "The CA is made aware of a possible
> compromise of the Private Key that signed the Certificate".
>
>
> In Section 4.9.1.2 (Reasons for Revoking a Subordinate CA Certificate)
>
>
> Replace with:
>
> The Issuing CA SHALL revoke a Subordinate CA Certificate within seven (7)
> days if one or more of the following occurs:
>
> 1. The Externally Operated Subordinate CA requests revocation in
> writing;
> 2. The Externally Operated Subordinate CA notifies the Issuing CA that
> the original certificate request was not authorized and does not retroactively
> grant authorization;
> 3. The Issuing CA obtains evidence that the Private Key corresponding
> to the Public Key in the Subordinate CA Certificate suffered a Key
> Compromise or no longer complies with the requirements of Sections 6.1.5
> and 6.1.6;
> 4. The Issuing CA obtains evidence that the Private Key corresponding
> to the Public Key in the Subordinate CA Certificate was misused;
> 5. The Issuing CA is made aware that the Subordinate CA Certificate was
> not issued in accordance with, or that the Externally Operated Subordinate
> CA has not complied with these Requirements or the applicable Certificate
> Policy or Certification Practice Statement;
> 6. The Issuing CA determines that any of the information appearing in
> the Subordinate CA Certificate is inaccurate or misleading;
> 7. The Issuing CA or the Subordinate CA ceases operations for any
> reason and has not made arrangements for another CA to provide revocation
> support for the Subordinate CA Certificate;
> 8. The Issuing CA's or Externally Operated Subordinate CA's right to
> issue Certificates under these Requirements expires or is revoked or
> terminated, unless the Issuing CA has made arrangements to continue
> maintaining the CRL/OCSP Repository;
> 9. Revocation is required by the Issuing CA's Certificate Policy and/or
> Certification Practice Statement; or
> 10. The technical content or format of the Subordinate CA Certificate
> presents an unacceptable risk to Application Software Suppliers or Relying
> Parties (e.g. the CA/Browser Forum might determine that a deprecated
> cryptographic/signature algorithm or key size presents an unacceptable risk
> and that such Subordinate CA Certificates should be revoked and replaced by
> CAs within a given period of time).
>
>
> In Section 4.9.9 (On-line revocation/status checking availability)
>
>
> Replace with:
>
> OCSP responses MUST conform to RFC6960 and/or RFC5019. OCSP
> responses MUST either:
>
> 1. Be signed by the Private Key associated with the Root CA Certificate
> or the Subordinate CA Certificate that issued the Certificates whose
> revocation status is being checked, or
> 2. Be signed by an OCSP Responder whose Certificate is issued by the
> Root CA Certificate or Subordinate CA Certificate that issued the Certificate
> whose revocation status is being checked.
>
> In the latter case, the OCSP signing Certificate MUST contain an extension of
> type id-pkix-ocsp-nocheck, as defined by RFC6960.
>
>
> In Section 4.9.10 (On-line revocation checking requirements)
>
>
> * Replace the first sentence with "Each CA SHALL support an OCSP
> capability using the GET method for Certificates issued in accordance with
> these Requirements".
> * Replace the last sentence, which currently reads: "Effective 1 August
> 2013, OCSP responders for CAs which are not Technically Constrained in line
> with Section 7.1.5 MUST NOT respond with a 'good' status for such
> certificates." with: "OCSP Responders for Subordinate CA Certificates that are
> Technically Constrained in accordance with Section 7.1.5 are exempt from
> this prohibition on responding "good" to OCSP requests for the status on
> Certificates that have not been issued."
>
>
> In Section 5.2.2 (Number of Individuals Required per Task)
>
>
> * Replace with: "The Private Key associated with a Root CA Certificate
> or Subordinate CA Certificate SHALL be backed up, stored, and recovered
> only by personnel in trusted roles using, at least, dual control in a physically
> secured environment."
>
>
> In Section 5.4.1 (Types of events recorded)
>
>
> Replace subsections 1 and 2 in the second paragraph of so that they read:
>
> The CA SHALL record at least the following events:
>
> 1. Private Key lifecycle management events for the Root CA Certificate or
> Subordinate CA Certificate, including:
>
> 2. Certificate lifecycle management events for the Root CA Certificate,
> Subordinate CA Certificate, and Subscriber Certificates, including:
>
> a. Certificate requests, renewal, and re-key requests, and revocation;
> b. All verification activities stipulated in these Requirements and the
> CA's Certification Practice Statement;
> c. Date, time, phone number used, persons spoken to, and end results
> of verification telephone calls;
> d. Acceptance and rejection of certificate requests; Frequency of
> Processing Log
> e. Issuance of Certificates; and
> f. Generation of Certificate Revocation Lists and OCSP entries.
>
>
> In Section 5.7.1 (Incident and compromise handling procedures)
>
>
> * Delete the word "organizations" in the first sentence of so that it reads,
> "CAs shall have an Incident Response Plan and a Disaster Recovery Plan."
>
>
> In Section 6.1.1.1 (CA Key Pair Generation)
>
>
> Replace the first two paragraphs with the following:
>
> For a Key Pair generated to be associated with either (i) a Root CA Certificate
> or (ii) a Subordinate CA Certificate to be operated by an Externally Operated
> Subordinate CA, the CA SHALL:
>
> 1. prepare and follow a Key Generation Script,
> 2. have a Qualified Auditor witness the Key Pair generation process or
> record a video of the entire Key Pair generation process, and
> 3. have a Qualified Auditor issue a report opining that the CA followed
> its key ceremony during its Key and Certificate generation process and the
> controls used to ensure the integrity and confidentiality of the Key Pair.
>
> For a Key Pair generated to be associated with a Subordinate CA Certificate to
> be operated by the Root CA Operator or its Affiliates, the CA SHOULD:
>
> 1. prepare and follow a Key Generation Script and
> 2. have a Qualified Auditor witness the Key Pair generation process or
> record a video of the entire Key Pair generation process.
>
> In all cases, the CA SHALL:
>
> 1. generate the Key in a physically secured environment as described in
> the CA's Certificate Policy and/or Certification Practice Statement;
> 2. generate the Key using personnel in trusted roles under the
> principles of multiple person control and split knowledge;
> 3. generate the Key within cryptographic modules meeting the
> applicable technical and business requirements as disclosed in the CA's
> Certificate Policy and/or Certification Practice Statement;
> 4. log its Key generation activities; and
> 5. maintain effective controls to provide reasonable assurance that the
> Private Key was generated and protected in conformance with the
> procedures described in its Certificate Policy and/or Certification Practice
> Statement and (if applicable) its Key Generation Script.
>
>
> Change the title of Section 6.1.7 as "Key usage purposes (as per X.509 v3 key
> usage field)"
>
>
> In Section 6.1.7 replace with:
>
> Private Keys associated with Root CA Certificates MUST NOT be used to sign
> Certificates except in the following cases:
>
> 1. Self-signed Root CA Certificates themselves;
> 2. Subordinate CA Certificates and Cross Certificates;
> 3. Certificates for infrastructure purposes (e.g. administrative role
> certificates, internal CA operational device certificates, and OCSP Response
> verification Certificates); and
> 4. Certificates issued solely for the purpose of testing products with
> Certificates issued by a Root CA Certificate.
>
>
> In Section 6.2.5 (Private key archival)
>
>
> Replace with:
>
> "Parties other than the Subordinate CA Operator SHALL NOT archive the
> Private Keys associated with the Subordinate CA Certificate without
> authorization by the Subordinate CA Operator."
>
>
> In Section 6.2.6 (Private key transfer into or from a cryptographic module)
>
>
> Replace with:
>
> If the Issuing CA generated the Private Key on behalf of an Externally
> Operated Subordinate CA, then the Issuing CA SHALL encrypt the Private Key
> for transport to the Externally Operated Subordinate CA.
>
> If the Issuing CA becomes aware that an Externally Operated Subordinate
> CA's Private Key has been communicated to an unauthorized person or an
> organization not affiliated with the Externally Operated Subordinate CA, then
> the Issuing CA SHALL revoke all Subordinate CA Certificates that include the
> Public Key corresponding to the communicated Private Key.
>
>
> In Section 7.1.2.1 (Root CA Certificate)
>
>
> Replace subsection b. (keyUsage), with:
>
> "This extension MUST be present and MUST be marked critical. Bit positions
> for keyCertSign and cRLSign MUST be set. If the Private Key associated with
> the Root CA Certificate is to be used for signing OCSP responses, then the
> digitalSignature bit MUST be set."
>
>
> In Section 7.1.2.2 (Subordinate CA Certificate)
>
>
> Replace subsection a. through c, subsections e. and g. with the following:
>
> a. certificatePolicies
>
> This extension MUST be present and SHOULD NOT be marked critical.
>
> * certificatePolicies:policyIdentifier (Required)
> * The following fields MAY be present:
>
> certificatePolicies:policyQualifiers:policyQualifierId (Optional)
>
> * id-qt 1 [RFC 5280]
>
> certificatePolicies:policyQualifiers:qualifier:cPSuri (Optional)
>
> * HTTP URL for the CA's Certificate Policy, Certification Practice
> Statement, Relying Party Agreement, or other pointer to online policy
> information provided by the CA.
>
> b. cRLDistributionPoints
>
> * This extension MUST be present and MUST NOT be marked critical. It
> MUST contain the HTTP URL of the Issuing CA's CRL service where revocation
> of the Subordinate CA Certificate will be published.
>
> c. authorityInformationAccess
>
> * With the exception of stapling, which is noted below, this extension
> MUST be present. It MUST NOT be marked critical, and it MUST contain the
> HTTP URL of the Issuing CA's OCSP responder that provides the status of the
> Subordinate CA Certificate (accessMethod = 1.3.6.1.5.5.7.48.1). It SHOULD
> also contain the HTTP URL of the Issuing CA's CA Certificate (accessMethod =
> 1.3.6.1.5.5.7.48.2).
> *
> * The HTTP URL of the Issuing CA's OCSP responder MAY be omitted,
> provided that the Subscriber "staples" the OCSP response for the Certificate
> in its TLS handshakes [RFC4366].
>
> e. keyUsage
>
> * This extension MUST be present and MUST be marked critical. Bit
> positions for keyCertSign and cRLSign MUST be set. If the Private Key that
> corresponds to the Subordinate CA Certificate is used for signing OCSP
> responses, then the digitalSignature bit MUST be set.
>
> g. extkeyUsage (optional)
>
> For Subordinate CA Certificates to be Technically constrained in line with
> section 7.1.5, then either the value id-kp-serverAuth [RFC5280] or id-kp-
> clientAuth [RFC5280] or both values MUST be present**.
>
> Other values MAY be present.
>
> If present, this extension SHOULD be marked non-critical.
>
> ** Generally Extended Key Usage will only appear within end entity
> certificates (as highlighted in RFC 5280 (4.2.1.12)), however, Subordinate CA
> Operators MAY include the extension to further protect relying parties until
> the use of the extension is consistent between Application Software
> Suppliers whose software is used by a substantial portion of Relying Parties
> worldwide.
>
>
> In Section 7.1.2.3 (Subscriber Certificate)
>
>
> Replace subsection a. with the following:
>
> a. certificatePolicies
>
> This extension MUST be present and SHOULD NOT be marked critical.
>
> * certificatePolicies:policyIdentifier (Required)
> * A Policy Identifier, defined by the issuing CA, that indicates a
> Certificate Policy asserting the issuing CA's adherence to and compliance with
> these Requirements. The following extensions MAY be present:
> certificatePolicies:policyQualifiers:policyQualifierId (Recommended)
> * id-qt 1 [RFC 5280]. certificatePolicies:policyQualifiers:qualifier:cPSuri
> (Optional)
> * HTTP URL for the Subordinate CA Operator's Certification Practice
> Statement, Relying Party Agreement or other pointer to online information
> provided by the CA.
>
> Replace subsection c. with the following:
>
> c. authorityInformationAccess
>
> With the exception of stapling, which is noted below, this extension MUST be
> present. It MUST NOT be marked critical, and it MUST contain the HTTP URL
> of the Issuing CA's OCSP responder that provides the status of the Certificate
> (accessMethod = 1.3.6.1.5.5.7.48.1). It SHOULD also contain the HTTP URL of
> the Issuing CA's CA Certificate (accessMethod = 1.3.6.1.5.5.7.48.2).
>
> The HTTP URL of the Issuing CA's OCSP responder MAY be omitted provided
> that the Subscriber "staples" OCSP responses for the Certificate in its TLS
> handshakes [RFC4366].
>
>
> In Section 7.1.3 (Algorithm object identifiers)
>
>
> Replace the first paragraph with:
>
> "CAs MUST NOT sign Certificates using the SHA-1 hash algorithm. This Section
> (7.1.3) does not apply to existing Root CA Certificates or Cross Certificates.
> CAs MAY continue to use their existing SHA-1 Root CA Certificates. SHA-2
> Subscriber Certificates SHOULD NOT chain up to a SHA-1 Subordinate CA
> Certificate".
>
>
> In Section 7.1.4.1 (Issuing CA Certificate Subject)
>
>
> Replace with:
>
> "The content of the Certificate Issuer Distinguished Name field MUST match
> the Subject DN of the Issuing CA's CA Certificate to support name chaining as
> specified in RFC 5280, section 4.1.2.4."
>
>
> In Section 7.1.5 (Name Constraints)
>
>
> Replace the last paragraph with:
>
> If the Subordinate CA Operator is not allowed to issue certificates with
> dNSNames, then the Subordinate CA Certificate MUST include a zero-length
> dNSName in excludedSubtrees. Otherwise, the Subordinate CA Certificate
> MUST include at least one dNSName in permittedSubtrees.
>
>
> In Section 7.1.6.1 (Reserved Certificate Policy Identifiers)
>
>
> Replace the first sentence with:
>
> This section describes the content requirements for the Root CA Certificates,
> Subordinate CA Certificates, and Subscriber Certificates, as they relate to the
> identification of Certificate Policy.
>
>
> In Section 7.1.6.3 (Subordinate CA Certificates)
>
>
> Replace with:
>
> A Subordinate CA Certificate issued after the Effective Date to an Externally
> Operated Subordinate CA:
>
> 1. MUST include one or more explicit policy identifiers that indicates the
> Externally Operated Subordinate CA's adherence to and compliance with
> these Requirements (i.e. either the CA/Browser Forum reserved identifiers or
> identifiers defined by the CA in its Certificate Policy and/or Certification
> Practice Statement) and
> 2. MUST NOT contain the "anyPolicy" identifier (2.5.29.32.0).
>
> A Subordinate CA Certificate issued after the Effective Date to an Internally
> Operated Subordinate CA:
>
> 1. MAY include the CA/Browser Forum reserved identifiers or an
> identifier defined by the CA in its Certificate Policy and/or Certification
> Practice Statement to indicate the Internally Operated Subordinate CA's
> compliance with these Requirements and
> 2. MAY contain the "anyPolicy" identifier (2.5.29.32.0) in place of an
> explicit policy identifier.
>
> All CAs SHALL represent, in their Certificate Policy and/or Certification
> Practice Statement, that all Certificates containing a policy identifier
> indicating compliance with these Requirements are issued and managed in
> accordance with these Requirements.
>
>
> In Section 8.1 (Frequency or circumstances of assessment)
>
>
> Replace the first paragraph with:
>
> CA Certificates MUST either be (a) Technically Constrained in line with section
> 7.1.5 and be audited in line with section 8.7 only, or (b) be fully audited in line
> with all requirements of this section (8). A Certificate is deemed capable of
> being used to issue certificates for server authentication if it contains an
> X.509v3 basicConstraints extension with the CA boolean set to true and has
> no EKU, the id-kp-anyExtendedKeyUsage [RFC5280] EKU, or the id-kp-
> serverAuth [RFC5280] EKU.
>
>
> In Section 8.7 (Self-Audits)
>
>
> Replace the last paragraph with:
>
> During the period in which a Technically Constrained Externally Operated
> Subordinate CA issues Certificates, the Issuing CA SHALL monitor adherence
> to the Issuing CA's Certificate Policy and/or Certification Practice Statement
> and the Externally Operated Subordinate CA's Certificate Policy and/or
> Certification Practice Statement. On at least a quarterly basis, against a
> randomly selected sample of the greater of one certificate or at least three
> percent of the Certificates issued by the Externally Operated Subordinate CA,
> during the period commencing immediately after the previous audit sample
> was taken, the CA SHALL ensure adherence to all applicable Certificate
> Policies and/or Certification Practice Statements.
>
>
> In Section 9.6.1 (CA representations and warranties)
>
>
> Replace subsection 2 with:
>
> "2. All Application Software Suppliers with whom the Root CA Operator has
> entered into a contract for inclusion of its Root CA Certificate in software
> distributed by such Application Software Supplier; and"
>
> Replace the last paragraph with:
>
> The Root CA Operator SHALL be responsible for the performance and
> warranties of its Externally Operated Subordinate CAs, for the Externally
> Operated Subordinate CAs' compliance with these Requirements, and for all
> liabilities and indemnification obligations of the Externally Operated
> Subordinate CAs under these Requirements, as if the Root CA Operator were
> the Externally Operated Subordinate CA issuing the Certificates.
>
> -- MOTION ENDS --
>
> The procedure for this ballot is as follows (exact start and end times may be
> adjusted to comply with applicable Bylaws and IPR Agreement):
>
> BALLOT 188 Status: Clarify use of term "CA" in Baseline Requirements
>
> Start time (22:00 UTC)
>
> End time (22:00 UTC)
>
> Discussion (7 days)
>
> 16 Feb. 2017
>
> 23 Feb. 2017
>
> Vote for approval (7 days)
>
> 23 Feb. 2017
>
> 2 Mar. 2017
>
> If vote approves ballot: Review Period (Chair to send Review Notice) (30
> calendar days). If Exclusion Notice(s) filed, ballot approval is rescinded and
> PAG to be created. If no Exclusion Notices filed, ballot becomes effective at
> end of Review Period.
>
> Upon filing of Review Notice by Chair
>
> 30 days after filing of Review Notice by Chair
>
> This is a Draft Guideline Ballot that proposes a Final Maintenance Guideline.
> In accordance with Section 2.3 of the Bylaws this ballot includes a full set of
> the Baseline Requirements with a redline or comparison showing the set of
> changes from the Final Guideline section(s) intended to become a Final
> Maintenance Guideline. Such redline or comparison has been made against
> the Final Guideline section(s) as they exist at the time that this ballot is
> proposed.
>
> Votes must be cast by posting an on-list reply to this thread on the Public
> Mail List.
>
> A vote in favor of the ballot must indicate a clear 'yes' in the response. A vote
> against must indicate a clear 'no' in the response. A vote to abstain must
> indicate a clear 'abstain' in the response. Unclear responses will not be
> counted. The latest vote received from any representative of a voting
> Member before the close of the voting period will be counted. Voting
> Members are listed here: https://cabforum.org/members/
>
> In order for the ballot to be adopted, two thirds or more of the votes cast by
> Members in the CA category and greater than 50% of the votes cast by
> members in the browser category must be in favor. Quorum is currently ten
> (10) Members - at least ten Members must participate in the ballot, either by
> voting in favor, voting against, or abstaining.
>
>
>
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public
More information about the Public
mailing list