[Servercert-wg] 2024-07-18 Final servercert-wg Meeting Minutes
Inigo Barreira
Inigo.Barreira at sectigo.com
Mon Aug 5 08:07:46 UTC 2024
Here are the 2024-07-18 final minutes for the servercert-wg meeting.
# Attendees
Aaron Gable (Let's Encrypt), Aaron Poulsen (Amazon), Adrian Mueller
(SwissSign), Adriano Santoni (Actalis S.p.A.), Andrea Holland (VikingCloud),
Ben Wilson (Mozilla), Bruce Morton (Entrust), Chad Dandar (Cisco Systems),
Corey Bonnell (DigiCert), Corey Rasmussen (OATI), Dean Coclin (DigiCert),
Dimitris Zacharopoulos (HARICA), Doug Beattie (GlobalSign), Dustin
Hollenback (Microsoft), Inaba Atsushi (GlobalSign), Jaime Hablutzel (OISTE
Foundation), Janet Hines (VikingCloud), Johnny Reading (GoDaddy), Karina
Sirota (Microsoft), Lynn Jeun (Visa), Marco Schambach (IdenTrust), Martijn
Katerbarg (Sectigo), Michelle Coon (OATI), Nargis Mannan (VikingCloud), Nate
Smith (GoDaddy), Nicol So (CommScope), Peter Miskovic (Disig), Rebecca Kelly
(SSL.com), Rollin Yu (TrustAsia), Sandy Balzer (SwissSign), Scott Rea
(eMudhra), Stephen Davidson (DigiCert), Tadahiko Ito (SECOM Trust Systems),
Thomas Zermeno (SSL.com), Tobias Josefowitz (Opera Software AS), Wayne
Thayer (Fastly), Wendy Brown (US Federal PKI Management Authority), Yamian
Quintero (Microsoft)
# Minutes
Dustin read the Note Well.
Interested Party applications for Mike Shaver and Amir Omidi were approved.
June 20th meeting minutes were approved.
## Ballot Status
1. SC-75 (pre-issuance linting): Passed
2. SC-67 (MPIC): In voting period
3. SC-xx (Profiles cleanup ballot): On hold
4. SC-71 (Terms of Use/Subscriber Agreement): On hold, will resume soon
## Issues to discuss
### Github issue <https://github.com/mozilla/pkipolicy/issues/280>
https://github.com/mozilla/pkipolicy/issues/280
Ben provided the background on this issue. Ben said that the issue is
relevant
to both pre-certificates and final certificates. Within a certain period of
time,
the CA must globally distribute the corresponding for Relying Parties. Ben's
initial
suggestion is 15 minutes after issuance, but the discussion continues.
Aaron said that establishing this grace period is a good idea, as we have
done similar
for CRLs. Aaron said he does not feel strongly on the exact time period (15
minutes vs. 1 hour).
Aaron is unsure that we should explicitly reference "unused" and "reserved",
as "reserved"
serial numbers do not exist. This is something that should be cleaned up in
<https://github.com/cabforum/servercert/issues/422>
https://github.com/cabforum/servercert/issues/422. There was agreement by
Dimitris and Martijn that this language needs
to be improved.
Aaron said there is another related issue in that there is a BR requirement
for the CA to operate a revocation status service, but there are other
passages that outline similar requirements. It would be useful to make these
consistent.
Ben revisited the grace period topic on whether to use 15 minutes or 1 hour.
Aaron and Dimitris agreed that 15 minutes is sufficient. Ben raised the
concern that many bugs may be filed for minor infractions of an arbitrary
requirement. Aaron suggested that someone should write a ballot to overhaul
section 4.9.10 and suggest a time period. Then participants can discuss the
concrete proposal. Ben agreed to take this on.
### Github issue <https://github.com/cabforum/servercert/issues/436>
https://github.com/cabforum/servercert/issues/436
Martijn said this issue is similar to the Extant CA sunset for the SMIME
BRs, where ICA
certificates that do not comply with the current profile are sunsetted. Ben
mentioned it
would be good to have a list of ICAs that do not comply with the current
profile to determine
potential impact. It was suggested to use a linter to determine this. Since
pkilint is up to date with SC-62 requirement, it was further suggested to
use pkilint for this analysis. Martijn took an action item to do this
analysis.
### Github issue <https://github.com/cabforum/servercert/issues/437>
https://github.com/cabforum/servercert/issues/437
No discussion.
### Github issue <https://github.com/cabforum/servercert/issues/438>
https://github.com/cabforum/servercert/issues/438
This issue in particular wasn't discussed, but Ben suggested that it would
be good to look at
only cleanup items so that we can produce a cleanup ballot after this
review. Corey agreed and said
that is a more efficient use of time.
### Github issue <https://github.com/cabforum/servercert/issues/442>
https://github.com/cabforum/servercert/issues/442
Ben said this issue may be difficult to resolve, as it is difficult to
define exactly what "made aware" means. Wayne said that SC-73 partially
reserved the issue.
### Github issue <https://github.com/cabforum/servercert/issues/443>
https://github.com/cabforum/servercert/issues/443
It was agreed that this issue can be closed.
### Github issue <https://github.com/cabforum/servercert/issues/444>
https://github.com/cabforum/servercert/issues/444
Dimitris said that we should add a reference to the appropriate section
where name constraints are addressed.
## Other business
Dustin adjourned the meeting.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20240805/1875b8ac/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 6630 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20240805/1875b8ac/attachment-0001.p7s>
More information about the Servercert-wg
mailing list