[Servercert-wg] Servercert-wg Digest, Vol 61, Issue 9

Peter Miškovič Peter.Miskovic at disig.sk
Tue Jul 11 09:56:17 UTC 2023


Disig votes "YES" on Ballot SC-59 v2 "Weak Key  Guidance".

Regards
Peter Miskovic

-----Original Message-----
From: Servercert-wg <servercert-wg-bounces at cabforum.org> On Behalf Of servercert-wg-request at cabforum.org
Sent: štvrtok 6. júla 2023 18:18
To: servercert-wg at cabforum.org
Subject: Servercert-wg Digest, Vol 61, Issue 9

Send Servercert-wg mailing list submissions to
        servercert-wg at cabforum.org

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.cabforum.org/mailman/listinfo/servercert-wg
or, via email, send a message with subject or body 'help' to
        servercert-wg-request at cabforum.org

You can reach the person managing the list at
        servercert-wg-owner at cabforum.org

When replying, please edit your Subject line so it is more specific than "Re: Contents of Servercert-wg digest..."


Today's Topics:

   1. Voting Period Begins - Ballot SC-59 v2 "Weak Key  Guidance"
      (Tom Zermeno)


----------------------------------------------------------------------

Message: 1
Date: Thu, 6 Jul 2023 16:17:19 +0000
From: Tom Zermeno <tom at ssl.com>
To: Infrastructure Bot via Servercert-wg <servercert-wg at cabforum.org>
Subject: [Servercert-wg] Voting Period Begins - Ballot SC-59 v2 "Weak
        Key     Guidance"
Message-ID:
        <SJ0PR13MB55463CF7119FBDD7D59069A3AF2CA at SJ0PR13MB5546.namprd13.prod.outlook.com>

Content-Type: text/plain; charset="us-ascii"

Purpose of the Ballot SC-59

This ballot proposes updates to the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates related to the identification and revocation of certificates with private keys that were generated in a manner that may make them susceptible to easy decryption. It specifically deals with Debian weak keys, ROCA, and Close Primes Vulnerability.

Notes:

*       Thank you to the participants who voiced opinions and concerns about
the previous version of the ballot.  While there were many concerns about the inclusion of the Debian weak keys checks, we have decided to leave the checks in the ballot.  Our reasoning is that we wanted to strengthen the guidance statements, to help CAs ensure compliant certificate generation.
Future reviews of the BRs may cull the requirements, as is required by the needs of the community.
*       We believe that the requested date of November 15, 2023, will allow
enough time for Certificate Authorities to enact any changes to their systems to ensure that they perform the weak key checks on all CSRs submitted for TLS certificates.
*       The changes introduced in SC-59 do not conflict with any of the
recent ballots. As observed with other ballots in the past, minor administrative updates must be made to the proposed ballot text before publication such that the appropriate Version # and Change History are accurately represented (e.g., to indicate these changes will be represented in Version 2.0.1).

The following motion has been proposed by Thomas Zermeno of SSL.com and has been endorsed by Martijn Katerbarg of Sectigo and Ben Wilson of Mozilla.

- Motion Begins -

This ballot modifies the "Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates" ("Baseline Requirements"), based on Version 2.0.0.

MODIFY the Baseline Requirements as specified in the following Redline:
<https://github.com/cabforum/servercert/compare/a0360b61e73476959220dc328e3b
68d0224fa0b3...SSLcom:servercert:958e6ccac857b826fead6e4bd06d58f4fdd7fa7a>
https://github.com/cabforum/servercert/compare/a0360b61e73476959220dc328e3b6
8d0224fa0b3...SSLcom:servercert:958e6ccac857b826fead6e4bd06d58f4fdd7fa7a

- Motion Ends -

The procedure for approval of this ballot is as follows:

Discussion (7 days)

. Start time: 2023-06-26 22:00:00 UTC

. End time: 2023-07-03 21:59:59 UTC

Vote for approval (7 days)

  .  Start Time:  2023-07-06 17:00:00

  .  End Time:   2023-07-13 16:59:59



-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20230706/8967b464/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 6868 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20230706/8967b464/attachment.p7s>

------------------------------

Subject: Digest Footer

_______________________________________________
Servercert-wg mailing list
Servercert-wg at cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg


------------------------------

End of Servercert-wg Digest, Vol 61, Issue 9
********************************************


More information about the Servercert-wg mailing list