[Servercert-wg] VOTING BEGINS: Ballot SC39v3:
陳立群
realsky at cht.com.tw
Fri Feb 5 09:48:07 UTC 2021
Chunghwa Telecom votes YES on Ballot SC39v3.
Li-Chun Chen
From: Servercert-wg <servercert-wg-bounces at cabforum.org
<mailto:servercert-wg-bounces at cabforum.org> > On Behalf Of Neil Dunbar via
Servercert-wg
Sent: tirsdag 2. februar 2021 15:16
To: CA/B Forum Server Certificate WG Public Discussion List
<servercert-wg at cabforum.org <mailto:servercert-wg at cabforum.org> >
Subject: [Servercert-wg] VOTING BEGINS: Ballot SC39v3:
Colleagues,
This begins the voting period for ballot SC39v3: Definition of Critical
Vulnerability.
The following motion has been proposed by Neil Dunbar of TrustCor and
endorsed by Ben Wilson (Mozilla) and Corey Bonnell (DigiCert).
-- MOTION BEGINS --
This ballot modifies the “Network and Certificate System Security
Requirements” based on Version 1.5.
Under the section “Definitions”:
Remove the current definition:
Critical Vulnerability: A system vulnerability that has a CVSS score of 7.0
or higher according to the NVD or an equivalent to such CVSS rating (see
http://nvd.nist.gov/home.cfm
<https://eur04.safelinks.protection.outlook.com/?url=http%3A%2F%2Fnvd.nist.g
ov%2Fhome.cfm&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401
c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C6374787215871
88597%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik
1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=OFS8hIQ%2B7saP3lGAEaCBt58NM9agChj23olqN%2B
Nx%2FpE%3D&reserved=0> ), or as otherwise designated as a Critical
Vulnerability by the CA or the CA/Browser Forum.
Insert a new definition:
Critical Vulnerability: A system vulnerability that has a CVSS v2.0 score of
7.0 or higher according to the NVD or an equivalent to such CVSS rating (see
https://nvd.nist.gov/vuln-metrics/cvss
<https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.
gov%2Fvuln-metrics%2Fcvss&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C256
6adb33e67401c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C6
37478721587198554%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=iWBMZP1%2FKcn5KxDem1aBSQJ91NM1
xOU506PlY%2BkrqVo%3D&reserved=0> ), or as otherwise designated as a Critical
Vulnerability by the CA or the CA/Browser Forum.
-- MOTION ENDS --
* WARNING *: USE AT YOUR OWN RISK. THE REDLINE BELOW IS NOT THE OFFICIAL
VERSION OF THE CHANGES (CABF Bylaws, Section 2.4(a)):
A comparison of the changes can be found at:
https://github.com/cabforum/servercert/compare/2b7720f...neildunbar:61fd381?
diff=split
<https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.co
m%2Fcabforum%2Fservercert%2Fcompare%2F2b7720f...neildunbar%3A61fd381%3Fdiff%
3Dsplit&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401c1c200
8d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C637478721587208508%
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi
LCJXVCI6Mn0%3D%7C1000&sdata=v0qr5mzMKba1fZpE8%2Fs2FxIfzIbf4nc71wb9Jx9ntrU%3D
&reserved=0>
This ballot proposes one Final Maintenance Guideline.
The procedure for approval of this ballot is as follows:
Vote for approval (7 days)
Start Time: 2020-02-02 1700 UTC
End Time: 2020-02-09 1700 UTC
Regards,
Neil
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210205/d5056200/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 7389 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210205/d5056200/attachment.p7s>
More information about the Servercert-wg
mailing list