[Servercert-wg] VOTING BEGINS: Ballot SC39v3:
Mads Egil Henriksveen
Mads.Henriksveen at buypass.no
Fri Feb 5 08:21:16 UTC 2021
Buypass votes YES on Ballot SC39v3.
Regards
Mads
From: Servercert-wg <servercert-wg-bounces at cabforum.org> On Behalf Of Neil Dunbar via Servercert-wg
Sent: tirsdag 2. februar 2021 15:16
To: CA/B Forum Server Certificate WG Public Discussion List <servercert-wg at cabforum.org>
Subject: [Servercert-wg] VOTING BEGINS: Ballot SC39v3:
Colleagues,
This begins the voting period for ballot SC39v3: Definition of Critical Vulnerability.
The following motion has been proposed by Neil Dunbar of TrustCor and endorsed by Ben Wilson (Mozilla) and Corey Bonnell (DigiCert).
-- MOTION BEGINS --
This ballot modifies the "Network and Certificate System Security Requirements" based on Version 1.5.
Under the section "Definitions":
Remove the current definition:
Critical Vulnerability: A system vulnerability that has a CVSS score of 7.0 or higher according to the NVD or an equivalent to such CVSS rating (see http://nvd.nist.gov/home.cfm<https://eur04.safelinks.protection.outlook.com/?url=http%3A%2F%2Fnvd.nist.gov%2Fhome.cfm&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C637478721587188597%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=OFS8hIQ%2B7saP3lGAEaCBt58NM9agChj23olqN%2BNx%2FpE%3D&reserved=0>), or as otherwise designated as a Critical Vulnerability by the CA or the CA/Browser Forum.
Insert a new definition:
Critical Vulnerability: A system vulnerability that has a CVSS v2.0 score of 7.0 or higher according to the NVD or an equivalent to such CVSS rating (see https://nvd.nist.gov/vuln-metrics/cvss<https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln-metrics%2Fcvss&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C637478721587198554%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=iWBMZP1%2FKcn5KxDem1aBSQJ91NM1xOU506PlY%2BkrqVo%3D&reserved=0>), or as otherwise designated as a Critical Vulnerability by the CA or the CA/Browser Forum.
-- MOTION ENDS --
* WARNING *: USE AT YOUR OWN RISK. THE REDLINE BELOW IS NOT THE OFFICIAL VERSION OF THE CHANGES (CABF Bylaws, Section 2.4(a)):
A comparison of the changes can be found at:
https://github.com/cabforum/servercert/compare/2b7720f...neildunbar:61fd381?diff=split<https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcabforum%2Fservercert%2Fcompare%2F2b7720f...neildunbar%3A61fd381%3Fdiff%3Dsplit&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C637478721587208508%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=v0qr5mzMKba1fZpE8%2Fs2FxIfzIbf4nc71wb9Jx9ntrU%3D&reserved=0>
This ballot proposes one Final Maintenance Guideline.
The procedure for approval of this ballot is as follows:
Vote for approval (7 days)
Start Time: 2020-02-02 1700 UTC
End Time: 2020-02-09 1700 UTC
Regards,
Neil
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210205/4ef08065/attachment-0001.html>
More information about the Servercert-wg
mailing list