DigiCert votes "Yes" -----Original Message----- From: Dimitris Zacharopoulos [mailto:[email protected]] Sent: Thursday, February 23, 2017 11:17 AM To: Ben Wilson <[email protected]>; [email protected] Cc: Tim Hollebeek <[email protected]> Subject: Re: [cabfpub] Ballot 188 - Clarify use of term "CA" in Baseline Requirements
I see no problem with this amendment. Dimitris. On 23/2/2017 7:46 μμ, Ben Wilson wrote: > Voting starts at 2200 UTC today. One of the changes proposed by Ballot 188 > is to replace all instances of “Root Certificate” with “Root CA Certificate”, > but I just noticed that there are nine (9) places where “Root Certificate” > still appears, so I am proposing that Ballot 188 be deemed amended to > include those instances as well: > > > > Four (4) instances in Section 1.1, Overview; > > Three (3) in section 1.6.1 Definitions – in the definitions of “Application > Software Supplier,” “Publicly-Trusted Certificate,” and “Test Certificate”; > > One (1) in section 2.2; and > > One (1) in section 9.9.1. > > > > I believe Dimitris and Tim are OK with this amendment. > > > > Ben > > > > From: Public [mailto:[email protected]] On Behalf Of Ben Wilson via > Public > Sent: Tuesday, February 21, 2017 11:21 AM > To: [email protected] > Cc: Ben Wilson <[email protected]> > Subject: Re: [cabfpub] Ballot 188 - Clarify use of term "CA" in Baseline > Requirements > > > > This is a reminder that discussion is currently open on Ballot 188. > > The discussion period closes and voting begins at 2200 UTC on Thursday. > > Please take time to review the proposed changes before then. > > > > From: Public [mailto:[email protected]] On Behalf Of Dimitris > Zacharopoulos via Public > Sent: Thursday, February 16, 2017 1:40 PM > To: [email protected]<mailto:[email protected]> > Cc: Dimitris Zacharopoulos <[email protected]<mailto:[email protected]>> > Subject: [cabfpub] Ballot 188 - Clarify use of term "CA" in Baseline > Requirements > > > > Trying to fix formatting issues. Let's hope this goes through correctly. > Dimitris. > > Ballot 188 - Clarify use of term "CA" in Baseline Requirements > > The following motion has been proposed by Dimitris Zacharopoulos of HARICA > and endorsed by Ben Wilson of Digicert and Tim Hollebeek of Trustwave. > > Background: > > The Policy Review Working Group has completed its review of the Baseline > Requirements for purposes of clarifying use of the term "CA" and related > terminology. The term "CA" is used in the Baseline Requirements and other > documents to refer to "CA" as an organization or "CA" as a CA Certificate. > The Policy Review WG decided to update the Baseline Requirements first, and > then update the EV Guidelines and other documents so that the updated terms > are used consistently in all CA/B Forum documents. > > One of the proposed changes is not related to "CA" terminology. That proposed > change is in Section 4.9.10. Also, in section 6.1.7, some legacy language > related to 1024-bit RSA usage from Root CA, was removed. > > Some incorrect references (pointing to Section 3.3.1 instead of 4.2.1) are > corrected in Sections 3.2.2.4 and 4.1.2 > > In accordance with the Bylaws, a PDF with redlines to the Baseline > Requirements as they currently exist is attached to assist your review. > > -- MOTION BEGINS -- > > > In Section 1.1 (Overview) > > > * Delete the last sentence of section 1.1, which reads, "These > Requirements are applicable to all Certification Authorities within a chain > of trust. They are to be flowed down from the Root Certification Authority > through successive Subordinate Certification Authorities." > * Insert as the last sentence of section 1.1 the following: "These > requirements are applicable to all CAs that can issue a Certificate that > appears in a particular certificate chain from a Root Certificate that is > publicly trusted. They are to be flowed down from a Root Certificate through > successive Subordinate CA Certificates." > > > In Section 1.6.1 (Definitions) > > > * Insert a new definition for "CA Certificate" as: "A Certificate in > which the basicConstraints field has the cA attribute set to TRUE." > * Replace the definition of "Certificate Revocation List" with: "A > regularly updated time-stamped list of revoked Certificates that is created > and digitally signed by the Private Key associated with the Root CA > Certificate or Subordinate CA Certificate that issued the revoked > Certificates." > * Replace the definition of "Certification Authority" with: "An > organization that is responsible for the creation, issuance, revocation, and > management of Certificates. The term applies equally to Root CA Operators and > Subordinate CA Operators." > * Replace the definition of "Cross Certificate" with: "A CA Certificate > that is used to establish a trust relationship between two Root CA > Certificates." > * Insert a new definition for "Externally Operated Subordinate CA" as: > "A third party Subordinate CA Operator, not the Root CA Operator or its > Affiliate, that is in possession or control of the Private Key associated > with the Subordinate CA Certificate." > * Insert a new definition for "Internally Operated Subordinate CA" as: > "A Subordinate CA Operator, operated by a Root CA Operator or its Affiliate, > that is in possession or control of the Private Key associated with the > Subordinate CA Certificate." > * Replace the definition of "Issuing CA" with: "The Root CA Operator or > the Subordinate CA Operator that is in possession or control of the Private > Key of the "Issuer" named in a particular Certificate." > * Replace the definition of "Key Generation Script" with: "A documented > plan of procedures for the generation of the Key Pair to be associated with a > CA Certificate." > * Replace the definition of "OCSP Responder" with: "A system that > provides Online Certificate Status Protocol responses. See also, Online > Certificate Status Protocol." > * Replace the definition of "Root CA" with a new definition for "Root > CA Operator" as: "The top-level Certification Authority (i.e. an > organization) whose CA Certificate (or associated Public Key) is distributed > by Application Software Suppliers as a trust anchor." > * Replace the defined term "Root Certificate" with "Root CA > Certificate" and replace the definition with: "A CA Certificate in which the > Public Key has been digitally signed by its corresponding Private Key." > * Insert a new definition for "Subordinate CA Operator" as "A > Certification Authority in possession or control of the Private Key > associated with a Subordinate CA Certificate. A Subordinate CA Operator is > either an Externally Operated Subordinate CA or an Internally Operated > Subordinate CA." > * Replace the definition for "Subordinate CA" with "Subordinate CA > Certificate" as: "A CA Certificate that has been signed by the Private Key > associated with a Root CA Certificate or a different Subordinate CA > Certificate." > * Replace the definition of "Technically Constrained Subordinate CA > Certificate" with: "A Subordinate CA Certificate which uses a combination of > Extended Key Usage settings and Name Constraint settings to limit the scope > within which the Subordinate CA Certificate may issue Subscriber or > additional Subordinate CA Certificates." > > > In Section 1.6.2 (Acronyms) > > > * Insert a new acronym EKU --> "Extended Key Usage" > > > In Section 3.2.2.4 (Validation of Domain Authorization or Control) > > > * In the third paragraph, replace "Section 3.3.1" with "Section 4.2.1". > > > In Section 3.2.2.4.6 (Agreed-Upon Change to Website) > > > * In the 2nd paragraph, replace "Section 3.3.1 of these Guidelines" > with "Section 4.2.1 of this document". > > > In Section 4.1.2 (Enrollment Process and Responsibilities) > > > * In the 3rd paragraph, replace "Section 3.3.1" with "Section 4.2.1". > > > In Section 4.9.1.1 (Reasons for Revoking a Subscriber Certificate) > > > * Replace subsection 13 with: "The CA is made aware of a possible > compromise of the Private Key that signed the Certificate". > > > In Section 4.9.1.2 (Reasons for Revoking a Subordinate CA Certificate) > > > Replace with: > > The Issuing CA SHALL revoke a Subordinate CA Certificate within seven (7) > days if one or more of the following occurs: > > 1. The Externally Operated Subordinate CA requests revocation in writing; > 2. The Externally Operated Subordinate CA notifies the Issuing CA that > the original certificate request was not authorized and does not > retroactively grant authorization; > 3. The Issuing CA obtains evidence that the Private Key corresponding to > the Public Key in the Subordinate CA Certificate suffered a Key Compromise or > no longer complies with the requirements of Sections 6.1.5 and 6.1.6; > 4. The Issuing CA obtains evidence that the Private Key corresponding to > the Public Key in the Subordinate CA Certificate was misused; > 5. The Issuing CA is made aware that the Subordinate CA Certificate was > not issued in accordance with, or that the Externally Operated Subordinate CA > has not complied with these Requirements or the applicable Certificate Policy > or Certification Practice Statement; > 6. The Issuing CA determines that any of the information appearing in > the Subordinate CA Certificate is inaccurate or misleading; > 7. The Issuing CA or the Subordinate CA ceases operations for any reason > and has not made arrangements for another CA to provide revocation support > for the Subordinate CA Certificate; > 8. The Issuing CA's or Externally Operated Subordinate CA's right to > issue Certificates under these Requirements expires or is revoked or > terminated, unless the Issuing CA has made arrangements to continue > maintaining the CRL/OCSP Repository; > 9. Revocation is required by the Issuing CA's Certificate Policy and/or > Certification Practice Statement; or > 10. The technical content or format of the Subordinate CA Certificate > presents an unacceptable risk to Application Software Suppliers or Relying > Parties (e.g. the CA/Browser Forum might determine that a deprecated > cryptographic/signature algorithm or key size presents an unacceptable risk > and that such Subordinate CA Certificates should be revoked and replaced by > CAs within a given period of time). > > > In Section 4.9.9 (On-line revocation/status checking availability) > > > Replace with: > > OCSP responses MUST conform to RFC6960 and/or RFC5019. OCSP responses MUST > either: > > 1. Be signed by the Private Key associated with the Root CA Certificate > or the Subordinate CA Certificate that issued the Certificates whose > revocation status is being checked, or > 2. Be signed by an OCSP Responder whose Certificate is issued by the > Root CA Certificate or Subordinate CA Certificate that issued the Certificate > whose revocation status is being checked. > > In the latter case, the OCSP signing Certificate MUST contain an extension of > type id-pkix-ocsp-nocheck, as defined by RFC6960. > > > In Section 4.9.10 (On-line revocation checking requirements) > > > * Replace the first sentense with "Each CA SHALL support an OCSP > capability using the GET method for Certificates issued in accordance with > these Requirements". > * Replace the last sentence, which currently reads: "Effective 1 August > 2013, OCSP responders for CAs which are not Technically Constrained in line > with Section 7.1.5 MUST NOT respond with a 'good' status for such > certificates." with: "OCSP Responders for Subordinate CA Certificates that > are Technically Constrained in accordance with Section 7.1.5 are exempt from > this prohibition on responding "good" to OCSP requests for the status on > Certificates that have not been issued." > > > In Section 5.2.2 (Number of Individuals Required per Task) > > > * Replace with: "The Private Key associated with a Root CA Certificate > or Subordinate CA Certificate SHALL be backed up, stored, and recovered only > by personnel in trusted roles using, at least, dual control in a physically > secured environment." > > > In Section 5.4.1 (Types of events recorded) > > > Replace subsections 1 and 2 in the second paragraph of so that they read: > > The CA SHALL record at least the following events: > > 1. Private Key lifecycle management events for the Root CA Certificate or > Subordinate CA Certificate, including: > > 2. Certificate lifecycle management events for the Root CA Certificate, > Subordinate CA Certificate, and Subscriber Certificates, including: > > a. Certificate requests, renewal, and re-key requests, and revocation; > b. All verification activities stipulated in these Requirements and the > CA's Certification Practice Statement; > c. Date, time, phone number used, persons spoken to, and end results of > verification telephone calls; > d. Acceptance and rejection of certificate requests; Frequency of > Processing Log > e. Issuance of Certificates; and > f. Generation of Certificate Revocation Lists and OCSP entries. > > > In Section 5.7.1 (Incident and compromise handling procedures) > > > * Delete the word "organizations" in the first sentence of so that it reads, > "CAs shall have an Incident Response Plan and a Disaster Recovery Plan." > > > In Section 6.1.1.1 (CA Key Pair Generation) > > > Replace the first two paragraphs with the following: > > For a Key Pair generated to be associated with either (i) a Root CA > Certificate or (ii) a Subordinate CA Certificate to be operated by an > Externally Operated Subordinate CA, the CA SHALL: > > 1. prepare and follow a Key Generation Script, > 2. have a Qualified Auditor witness the Key Pair generation process or > record a video of the entire Key Pair generation process, and > 3. have a Qualified Auditor issue a report opining that the CA followed > its key ceremony during its Key and Certificate generation process and the > controls used to ensure the integrity and confidentiality of the Key Pair. > > For a Key Pair generated to be associated with a Subordinate CA Certificate > to be operated by the Root CA Operator or its Affiliates, the CA SHOULD: > > 1. prepare and follow a Key Generation Script and > 2. have a Qualified Auditor witness the Key Pair generation process or > record a video of the entire Key Pair generation process. > > In all cases, the CA SHALL: > > 1. generate the Key in a physically secured environment as described in > the CA's Certificate Policy and/or Certification Practice Statement; > 2. generate the Key using personnel in trusted roles under the > principles of multiple person control and split knowledge; > 3. generate the Key within cryptographic modules meeting the applicable > technical and business requirements as disclosed in the CA's Certificate > Policy and/or Certification Practice Statement; > 4. log its Key generation activities; and > 5. maintain effective controls to provide reasonable assurance that the > Private Key was generated and protected in conformance with the procedures > described in its Certificate Policy and/or Certification Practice Statement > and (if applicable) its Key Generation Script. > > > Change the title of Section 6.1.7 as "Key usage purposes (as per X.509 v3 key > usage field)" > > > In Section 6.1.7 replace with: > > Private Keys associated with Root CA Certificates MUST NOT be used to sign > Certificates except in the following cases: > > 1. Self-signed Root CA Certificates themselves; > 2. Subordinate CA Certificates and Cross Certificates; > 3. Certificates for infrastructure purposes (e.g. administrative role > certificates, internal CA operational device certificates, and OCSP Response > verification Certificates); and > 4. Certificates issued solely for the purpose of testing products with > Certificates issued by a Root CA Certificate. > > > In Section 6.2.5 (Private key archival) > > > Replace with: > > "Parties other than the Subordinate CA Operator SHALL NOT archive the Private > Keys associated with the Subordinate CA Certificate without authorization by > the Subordinate CA Operator." > > > In Section 6.2.6 (Private key transfer into or from a cryptographic module) > > > Replace with: > > If the Issuing CA generated the Private Key on behalf of an Externally > Operated Subordinate CA, then the Issuing CA SHALL encrypt the Private Key > for transport to the Externally Operated Subordinate CA. > > If the Issuing CA becomes aware that an Externally Operated Subordinate CA's > Private Key has been communicated to an unauthorized person or an > organization not affiliated with the Externally Operated Subordinate CA, then > the Issuing CA SHALL revoke all Subordinate CA Certificates that include the > Public Key corresponding to the communicated Private Key. > > > In Section 7.1.2.1 (Root CA Certificate) > > > Replace subsection b. (keyUsage), with: > > "This extension MUST be present and MUST be marked critical. Bit positions > for keyCertSign and cRLSign MUST be set. If the Private Key associated with > the Root CA Certificate is to be used for signing OCSP responses, then the > digitalSignature bit MUST be set." > > > In Section 7.1.2.2 (Subordinate CA Certificate) > > > Replace subsection a. through c, subsections e. and g. with the following: > > a. certificatePolicies > > This extension MUST be present and SHOULD NOT be marked critical. > > * certificatePolicies:policyIdentifier (Required) > * The following fields MAY be present: > > certificatePolicies:policyQualifiers:policyQualifierId (Optional) > > * id-qt 1 [RFC 5280] > > certificatePolicies:policyQualifiers:qualifier:cPSuri (Optional) > > * HTTP URL for the CA's Certificate Policy, Certification Practice > Statement, Relying Party Agreement, or other pointer to online policy > information provided by the CA. > > b. cRLDistributionPoints > > * This extension MUST be present and MUST NOT be marked critical. It > MUST contain the HTTP URL of the Issuing CA's CRL service where revocation of > the Subordinate CA Certificate will be published. > > c. authorityInformationAccess > > * With the exception of stapling, which is noted below, this extension > MUST be present. It MUST NOT be marked critical, and it MUST contain the HTTP > URL of the Issuing CA's OCSP responder that provides the status of the > Subordinate CA Certificate (accessMethod = 1.3.6.1.5.5.7.48.1). It SHOULD > also contain the HTTP URL of the Issuing CA's CA Certificate (accessMethod = > 1.3.6.1.5.5.7.48.2). > * > * The HTTP URL of the Issuing CA's OCSP responder MAY be omitted, > provided that the Subscriber "staples" the OCSP response for the Certificate > in its TLS handshakes [RFC4366]. > > e. keyUsage > > * This extension MUST be present and MUST be marked critical. Bit > positions for keyCertSign and cRLSign MUST be set. If the Private Key that > corresponds to the Subordinate CA Certificate is used for signing OCSP > responses, then the digitalSignature bit MUST be set. > > g. extkeyUsage (optional) > > For Subordinate CA Certificates to be Technically constrained in line with > section 7.1.5, then either the value id-kp-serverAuth [RFC5280] or > id-kp-clientAuth [RFC5280] or both values MUST be present**. > > Other values MAY be present. > > If present, this extension SHOULD be marked non-critical. > > ** Generally Extended Key Usage will only appear within end entity > certificates (as highlighted in RFC 5280 (4.2.1.12)), however, Subordinate CA > Operators MAY include the extension to further protect relying parties until > the use of the extension is consistent between Application Software Suppliers > whose software is used by a substantial portion of Relying Parties worldwide. > > > In Section 7.1.2.3 (Subscriber Certificate) > > > Replace subsection a. with the following: > > a. certificatePolicies > > This extension MUST be present and SHOULD NOT be marked critical. > > * certificatePolicies:policyIdentifier (Required) > * A Policy Identifier, defined by the issuing CA, that indicates a > Certificate Policy asserting the issuing CA's adherence to and compliance > with these Requirements. The following extensions MAY be present: > certificatePolicies:policyQualifiers:policyQualifierId (Recommended) > * id-qt 1 [RFC 5280]. > certificatePolicies:policyQualifiers:qualifier:cPSuri (Optional) > * HTTP URL for the Subordinate CA Operator's Certification Practice > Statement, Relying Party Agreement or other pointer to online information > provided by the CA. > > Replace subsection c. with the following: > > c. authorityInformationAccess > > With the exception of stapling, which is noted below, this extension MUST be > present. It MUST NOT be marked critical, and it MUST contain the HTTP URL of > the Issuing CA's OCSP responder that provides the status of the Certificate > (accessMethod = 1.3.6.1.5.5.7.48.1). It SHOULD also contain the HTTP URL of > the Issuing CA's CA Certificate (accessMethod = 1.3.6.1.5.5.7.48.2). > > The HTTP URL of the Issuing CA's OCSP responder MAY be omitted provided that > the Subscriber "staples" OCSP responses for the Certificate in its TLS > handshakes [RFC4366]. > > > In Section 7.1.3 (Algorithm object identifiers) > > > Replace the first paragraph with: > > "CAs MUST NOT sign Certificates using the SHA-1 hash algorithm. This Section > (7.1.3) does not apply to existing Root CA Certificates or Cross > Certificates. CAs MAY continue to use their existing SHA-1 Root CA > Certificates. SHA-2 Subscriber Certificates SHOULD NOT chain up to a SHA-1 > Subordinate CA Certificate". > > > In Section 7.1.4.1 (Issuing CA Certificate Subject) > > > Replace with: > > "The content of the Certificate Issuer Distinguished Name field MUST match > the Subject DN of the Issuing CA's CA Certificate to support name chaining as > specified in RFC 5280, section 4.1.2.4." > > > In Section 7.1.5 (Name Constraints) > > > Replace the last paragraph with: > > If the Subordinate CA Operator is not allowed to issue certificates with > dNSNames, then the Subordinate CA Certificate MUST include a zero-length > dNSName in excludedSubtrees. Otherwise, the Subordinate CA Certificate MUST > include at least one dNSName in permittedSubtrees. > > > In Section 7.1.6.1 (Reserved Certificate Policy Identifiers) > > > Replace the first sentence with: > > This section describes the content requirements for the Root CA Certificates, > Subordinate CA Certificates, and Subscriber Certificates, as they relate to > the identification of Certificate Policy. > > > In Section 7.1.6.3 (Subordinate CA Certificates) > > > Replace with: > > A Subordinate CA Certificate issued after the Effective Date to an Externally > Operated Subordinate CA: > > 1. MUST include one or more explicit policy identifiers that indicates > the Externally Operated Subordinate CA's adherence to and compliance with > these Requirements (i.e. either the CA/Browser Forum reserved identifiers or > identifiers defined by the CA in its Certificate Policy and/or Certification > Practice Statement) and > 2. MUST NOT contain the "anyPolicy" identifier (2.5.29.32.0). > > A Subordinate CA Certificate issued after the Effective Date to an Internally > Operated Subordinate CA: > > 1. MAY include the CA/Browser Forum reserved identifiers or an > identifier defined by the CA in its Certificate Policy and/or Certification > Practice Statement to indicate the Internally Operated Subordinate CA's > compliance with these Requirements and > 2. MAY contain the "anyPolicy" identifier (2.5.29.32.0) in place of an > explicit policy identifier. > > All CAs SHALL represent, in their Certificate Policy and/or Certification > Practice Statement, that all Certificates containing a policy identifier > indicating compliance with these Requirements are issued and managed in > accordance with these Requirements. > > > In Section 8.1 (Frequency or circumstances of assessment) > > > Replace the first paragraph with: > > CA Certificates MUST either be (a) Technically Constrained in line with > section 7.1.5 and be audited in line with section 8.7 only, or (b) be fully > audited in line with all requirements of this section (8). A Certificate is > deemed capable of being used to issue certificates for server authentication > if it contains an X.509v3 basicConstraints extension with the CA boolean set > to true and has no EKU, the id-kp-anyExtendedKeyUsage [RFC5280] EKU, or the > id-kp-serverAuth [RFC5280] EKU. > > > In Section 8.7 (Self-Audits) > > > Replace the last paragraph with: > > During the period in which a Technically Constrained Externally Operated > Subordinate CA issues Certificates, the Issuing CA SHALL monitor adherence to > the Issuing CA's Certificate Policy and/or Certification Practice Statement > and the Externally Operated Subordinate CA's Certificate Policy and/or > Certification Practice Statement. On at least a quarterly basis, against a > randomly selected sample of the greater of one certificate or at least three > percent of the Certificates issued by the Externally Operated Subordinate CA, > during the period commencing immediately after the previous audit sample was > taken, the CA SHALL ensure adherence to all applicable Certificate Policies > and/or Certification Practice Statements. > > > In Section 9.6.1 (CA representations and warranties) > > > Replace subsection 2 with: > > "2. All Application Software Suppliers with whom the Root CA Operator has > entered into a contract for inclusion of its Root CA Certificate in software > distributed by such Application Software Supplier; and" > > Replace the last paragraph with: > > The Root CA Operator SHALL be responsible for the performance and warranties > of its Externally Operated Subordinate CAs, for the Externally Operated > Subordinate CAs' compliance with these Requirements, and for all liabilities > and indemnification obligations of the Externally Operated Subordinate CAs > under these Requirements, as if the Root CA Operator were the Externally > Operated Subordinate CA issuing the Certificates. > > -- MOTION ENDS -- > > The procedure for this ballot is as follows (exact start and end times may be > adjusted to comply with applicable Bylaws and IPR Agreement): > > BALLOT 188 Status: Clarify use of term "CA" in Baseline Requirements > > Start time (22:00 UTC) > > End time (22:00 UTC) > > Discussion (7 days) > > 16 Feb. 2017 > > 23 Feb. 2017 > > Vote for approval (7 days) > > 23 Feb. 2017 > > 2 Mar. 2017 > > If vote approves ballot: Review Period (Chair to send Review Notice) (30 > calendar days). If Exclusion Notice(s) filed, ballot approval is rescinded > and PAG to be created. If no Exclusion Notices filed, ballot becomes > effective at end of Review Period. > > Upon filing of Review Notice by Chair > > 30 days after filing of Review Notice by Chair > > This is a Draft Guideline Ballot that proposes a Final Maintenance Guideline. > In accordance with Section 2.3 of the Bylaws this ballot includes a full set > of the Baseline Requirements with a redline or comparison showing the set of > changes from the Final Guideline section(s) intended to become a Final > Maintenance Guideline. Such redline or comparison has been made against the > Final Guideline section(s) as they exist at the time that this ballot is > proposed. > > Votes must be cast by posting an on-list reply to this thread on the Public > Mail List. > > A vote in favor of the ballot must indicate a clear 'yes' in the response. A > vote against must indicate a clear 'no' in the response. A vote to abstain > must indicate a clear 'abstain' in the response. Unclear responses will not > be counted. The latest vote received from any representative of a voting > Member before the close of the voting period will be counted. Voting Members > are listed here: https://cabforum.org/members/ > > In order for the ballot to be adopted, two thirds or more of the votes cast > by Members in the CA category and greater than 50% of the votes cast by > members in the browser category must be in favor. Quorum is currently ten > (10) Members – at least ten Members must participate in the ballot, either by > voting in favor, voting against, or abstaining. > _______________________________________________ Public mailing list [email protected] https://cabforum.org/mailman/listinfo/public
