OISTE votes Yes to SC-75 v3 > > De: Servercert-wg <[email protected] > <mailto:[email protected]>> En nombre de Dimitris > Zacharopoulos (HARICA) via Servercert-wg > Enviado el: miércoles, 19 de junio de 2024 12:13 > Para: CA/B Forum Server Certificate WG Public Discussion List > <[email protected] <mailto:[email protected]>> > Asunto: [Servercert-wg] [Voting Begins] Ballot SC-75 v3 - Pre-sign linting > > CAUTION: This email originated from outside of the organization. Do not click > links or open attachments unless you recognize the sender and know the > content is safe. > > Voting begins for this ballot. > SC-75 v3 Pre-sign linting > > Summary > > There have been numerous compliance incidents publicly disclosed by CAs in > which they failed to comply with the technical requirements described in > standards associated with the issuance and management of publicly-trusted TLS > Certificates. However, the industry has developed open-source tools, linters, > that are free to use and can help CAs avoid certificate misissuance. Using > such linters before issuing a precertificate from a Publicly-Trusted CA > (pre-issuance linting) can prevent the mis-issuance in a wide variety of > cases. > > The following motion has been proposed by Dimitris Zacharopoulos of HARICA > and endorsed by Corey Bonnell of Digicert and Ben Wilson of Mozilla. > > You can view the GitHub pull request representing this ballot here > <https://github.com/cabforum/servercert/pull/518>. > > Motion Begins > > MODIFY the "Baseline Requirements for the Issuance and Management of > Publicly-Trusted TLS Server Certificates" based on Version 2.0.5 as specified > in the following redline: > > https://github.com/cabforum/servercert/compare/20af1b271f2b689344ae353d3e78dc6b772199db...d809c41bc063109e15d46bfe1b5ad6403d823381 > Motion Ends > > This ballot proposes a Final Maintenance Guideline. The procedure for > approval of this ballot is as follows: > > Discussion (at least 7 days) > > Start time: 2024-06-12 06:30:00 UTC > End time: on or after 2024-06-19 06:30:00 UTC > Vote for approval (7 days) > > Start time: 2024-06-19 10:00:00 UTC > End time: 2024-06-26 10:00:00 UTC > > <smime.p7s>_______________________________________________ > Servercert-wg mailing list > [email protected] <mailto:[email protected]> > https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.cabforum.org_mailman_listinfo_servercert-2Dwg&d=DwICAg&c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&r=-bX5hBm1IdRDykQ-dBR8tsFRCM4v1VXUyG7RZa2WqPY&m=0zIpoLvLwmd6ikO-w-T35kY4cbrLssYnqH5CqtfRB17hrq-_SqmcLS_wFyNu5DhJ&s=uXcRWFeUJOQHixMw43j9bJ3i8HNExoY7vMH2tkLLekk&e=
WISeKey SA Pedro Fuentes CSO - Trust Services Manager Office: + 41 (0) 22 594 30 00 Mobile: + 41 (0) 791 274 790 Address: Avenue Louis-Casaï 58 | 1216 Cointrin | Switzerland Stay connected with WISeKey <http://www.wisekey.com/> THIS IS A TRUSTED MAIL: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risks CONFIDENTIALITY: This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the sender DISCLAIMER: WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Servercert-wg mailing list [email protected] https://lists.cabforum.org/mailman/listinfo/servercert-wg
