[Servercert-wg] Final Minutes for Server Certificate Working Group Teleconference - January 24, 2019
Dimitris Zacharopoulos (HARICA)
dzacharo at harica.gr
Thu Feb 7 10:53:47 MST 2019
These are the Final Minutes of the Teleconference described in the
subject of this message.
Attendees (in alphabetical order)
Anna Weinberg (Apple), Arno Fiedler (D-TRUST), Ben Wilson (Digicert),
Bruce Morton (Entrust Datacard), Chris Kemmerer (SSL.com), Dimitris
Zacharopoulos (HARICA), Doug Beattie (GlobalSign), Dustin Hollenback
(Microsoft), Enrico Entschew (D-TRUST), Janet Hines (Trustwave), Frank
Corday (Trustwave), Geoff Keating (Apple), Gordon Bock (Microsoft),
Inaba Atsushi (GlobalSign), India Donald (US Federal PKI Management
Authority), Iñigo Barreira (360 Browser), Joanna Fox (GoDaddy), Kenneth
Myers (US Federal PKI Management Authority), Kirk Hall (Entrust
Datacard), Li-Chun Chen (Chunghwa Telecom), Mahmud Khair (Trustwave),
Michelle Coon (OATI), Neil Dunbar (TrustCor Systems), Niko Carpenter
(Trustwave), Rich Smith (Sectigo), Robin Alden (Sectigo), Ryan Sleevi
(Google), Shelley Brewer (Digicert), Tim Hollebeek (Digicert), Tim
Shirley (Trustwave), Tomasz Nowak (Opera Software AS), Trevoli
Ponds-White (Amazon), Vijayakumar (Vijay) Manjunatha (eMudhra), Wayne
Thayer (Mozilla).
Minutes
1. Roll Call
The Chair took attendance
2. Read Antitrust Statement
The Antitrust Statement was read
3. Review Agenda
The Agenda was approved.
4. Approval of Minutes of previous teleconference
The minutes of January 10, 2019 teleconference were approved and will be
posted to the Public list and the Public web site..
5. Validation Subcommittee Update
Ballot SC14 was discussed that is currently in discussion period on the
public mailing list. Ballot SC7 (remove any other method from IP
validation) now has 2 endorsers
The SC also begun to work on method 6 (website control). They will
further discuss this on the next call and suggested people to come with
ideas.
Methods 9 and 10 will come as separate ballots. There is already a
ballot to remove method 9 which has known problems, with no transition
period. Ryan will work on a ballot for method 10 to describe how to
perform validation with TLS ALPN which is not standardized yet in IETF.
The plan is to reference an explicit version number of the TLS ALPN draft.
High on the agenda next week is how to best use the validation slot at
the F2F 46 meeting.
6. NetSec Subcommittee Update
Ben reported that the NetSec Subcommittee continued to review the
different areas that the SC subdivided. They also looked at the
terminology of the current Network Security Requirements, started
looking at the risk assessment for CAs and an overall restructuring of
the Network Security Requirements.
7. Ballot Status
_Ballots in Discussion Period_
/Ballot SC14: Updated Phone Validation Methods/ (Doug)
Doug mentioned that the seven day review period is over and he plans on
starting the voting period.
/Ballot SC15: Remove Validation Method Number 9/ (Doug)
Doug reminded that the commenting period ends on Tuesday January 29th
and unless there are any concerns raised he will start the voting of
that ballot as well. If anyone has any issues, please submit them as
soon as possible.
/Ballot SC7: Update IP Address Validation Methods/ (Wayne)/
/Wayne mentioned that this ballot had been prepared for quite some time,
Tim originally drafted it and he took it over recently. The ballot is in
a good shape because it has been discussed extensively at the Validation
Subcommittee but he encourages people to take a look at it and send
comments as soon as possible.
_*Ballots in Review Period*_
Ballot SC13: CAA Contact Property and Associated E-mail Validation
Methods (Tim H.)
_Draft Ballots under Consideration_
/Improvements for Method 6, website control/ (Tim H.)/
/No comments were made.
8. Any Other Business
None.
9. Next call
February 7, 2019 at 11:00 am Eastern Time.
Adjourned
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cabforum.org/pipermail/servercert-wg/attachments/20190207/c27f35a6/attachment-0001.html>
More information about the Servercert-wg
mailing list