[Servercert-wg] VOTING BEGINS: Ballot SC39v3:

陳立群 realsky at cht.com.tw
Fri Feb 5 09:48:07 UTC 2021


 

Chunghwa Telecom votes YES on Ballot SC39v3.

 

 

Li-Chun Chen

 

From: Servercert-wg <servercert-wg-bounces at cabforum.org
<mailto:servercert-wg-bounces at cabforum.org> > On Behalf Of Neil Dunbar via
Servercert-wg
Sent: tirsdag 2. februar 2021 15:16
To: CA/B Forum Server Certificate WG Public Discussion List
<servercert-wg at cabforum.org <mailto:servercert-wg at cabforum.org> >
Subject: [Servercert-wg] VOTING BEGINS: Ballot SC39v3:

 

Colleagues, 

This begins the voting period for ballot SC39v3: Definition of Critical
Vulnerability.

The following motion has been proposed by Neil Dunbar of TrustCor and
endorsed by Ben Wilson (Mozilla) and Corey Bonnell (DigiCert). 

-- MOTION BEGINS -- 

This ballot modifies the “Network and Certificate System Security
Requirements” based on Version 1.5. 

Under the section “Definitions”: 

Remove the current definition: 

Critical Vulnerability: A system vulnerability that has a CVSS score of 7.0
or higher according to the NVD or an equivalent to such CVSS rating (see
http://nvd.nist.gov/home.cfm
<https://eur04.safelinks.protection.outlook.com/?url=http%3A%2F%2Fnvd.nist.g
ov%2Fhome.cfm&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401
c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C6374787215871
88597%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik
1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=OFS8hIQ%2B7saP3lGAEaCBt58NM9agChj23olqN%2B
Nx%2FpE%3D&reserved=0> ), or as otherwise designated as a Critical
Vulnerability by the CA or the CA/Browser Forum.


Insert a new definition: 

Critical Vulnerability: A system vulnerability that has a CVSS v2.0 score of
7.0 or higher according to the NVD or an equivalent to such CVSS rating (see
https://nvd.nist.gov/vuln-metrics/cvss
<https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.
gov%2Fvuln-metrics%2Fcvss&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C256
6adb33e67401c1c2008d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C6
37478721587198554%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=iWBMZP1%2FKcn5KxDem1aBSQJ91NM1
xOU506PlY%2BkrqVo%3D&reserved=0> ), or as otherwise designated as a Critical
Vulnerability by the CA or the CA/Browser Forum. 

-- MOTION ENDS -- 

* WARNING *: USE AT YOUR OWN RISK. THE REDLINE BELOW IS NOT THE OFFICIAL
VERSION OF THE CHANGES (CABF Bylaws, Section 2.4(a)): 

A comparison of the changes can be found at: 

https://github.com/cabforum/servercert/compare/2b7720f...neildunbar:61fd381?
diff=split
<https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.co
m%2Fcabforum%2Fservercert%2Fcompare%2F2b7720f...neildunbar%3A61fd381%3Fdiff%
3Dsplit&data=04%7C01%7Cmads.henriksveen%40buypass.no%7C2566adb33e67401c1c200
8d8c7850ce7%7C57919b2e6d5b40b9a34a55bddb02dfee%7C0%7C0%7C637478721587208508%
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi
LCJXVCI6Mn0%3D%7C1000&sdata=v0qr5mzMKba1fZpE8%2Fs2FxIfzIbf4nc71wb9Jx9ntrU%3D
&reserved=0>  

This ballot proposes one Final Maintenance Guideline. 

The procedure for approval of this ballot is as follows: 

Vote for approval    (7 days)


Start Time: 2020-02-02 1700 UTC 
End Time: 2020-02-09 1700 UTC

Regards, 

Neil 

 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210205/d5056200/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 7389 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210205/d5056200/attachment.p7s>


More information about the Servercert-wg mailing list