[Servercert-wg] [EXTERNAL]- Voting Period Begins - Ballot SC-59 v2 "Weak Key Guidance"
pfuentes at WISEKEY.COM
Wed Jul 12 12:57:36 UTC 2023
OISTE Abstains to SC-59 v2.
Too many relevant discussions were still happening when the voting started, and we had preferred to see those resolved to build our opinion. Even so, we don’t feel like voting “No” as in general we understand the intent of the ballot is positive.
> On 6 Jul 2023, at 18:17, Tom Zermeno via Servercert-wg <servercert-wg at cabforum.org> wrote:
> Purpose of the Ballot SC-59
> This ballot proposes updates to the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates related to the identification and revocation of certificates with private keys that were generated in a manner that may make them susceptible to easy decryption. It specifically deals with Debian weak keys, ROCA, and Close Primes Vulnerability.
> Thank you to the participants who voiced opinions and concerns about the previous version of the ballot. While there were many concerns about the inclusion of the Debian weak keys checks, we have decided to leave the checks in the ballot. Our reasoning is that we wanted to strengthen the guidance statements, to help CAs ensure compliant certificate generation. Future reviews of the BRs may cull the requirements, as is required by the needs of the community.
> We believe that the requested date of November 15, 2023, will allow enough time for Certificate Authorities to enact any changes to their systems to ensure that they perform the weak key checks on all CSRs submitted for TLS certificates.
> The changes introduced in SC-59 do not conflict with any of the recent ballots. As observed with other ballots in the past, minor administrative updates must be made to the proposed ballot text before publication such that the appropriate Version # and Change History are accurately represented (e.g., to indicate these changes will be represented in Version 2.0.1).
> The following motion has been proposed by Thomas Zermeno of SSL.com <http://ssl.com/> and has been endorsed by Martijn Katerbarg of Sectigo and Ben Wilson of Mozilla.
> - Motion Begins -
> This ballot modifies the “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates” (“Baseline Requirements”), based on Version 2.0.0.
> MODIFY the Baseline Requirements as specified in the following Redline: https://github.com/cabforum/servercert/compare/a0360b61e73476959220dc328e3b68d0224fa0b3...SSLcom:servercert:958e6ccac857b826fead6e4bd06d58f4fdd7fa7a
> - Motion Ends -
> The procedure for approval of this ballot is as follows:
> Discussion (7 days)
> • Start time: 2023-06-26 22:00:00 UTC
> • End time: 2023-07-03 21:59:59 UTC
> Vote for approval (7 days)
> • Start Time: 2023-07-06 17:00:00
> • End Time: 2023-07-13 16:59:59
> Servercert-wg mailing list
> Servercert-wg at cabforum.org <mailto:Servercert-wg at cabforum.org>
CSO - Trust Services Manager
Office: + 41 (0) 22 594 30 00
Mobile: + 41 (0) 791 274 790
Address: Avenue Louis-Casaï 58 | 1216 Cointrin | Switzerland
Stay connected with WISeKey <http://www.wisekey.com/>
THIS IS A TRUSTED MAIL: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks
CONFIDENTIALITY: This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender
DISCLAIMER: WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.
-------------- next part --------------
An HTML attachment was scrubbed...
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 3407 bytes
Desc: not available
More information about the Servercert-wg