Minutes of SMCWG

August 19, 2020



These are the Approved Minutes of the Teleconference described in the subject 
of this message. Corrections and clarifications where needed are encouraged by 
reply.


Attendees


Matthias Wiedenhorst  (ACAB'c), Arno Fiedler (Arno Fiedler), Mads Henriksveen  
(BuyPass), Qiu Dawei  (CFCA), Zhang Danmeng  (CFCA), Li-Chun Chen  (Chunghwa 
Telecom), Tsung-Min Kuo  (Chunghwa Telecom), Andreas Henschel (D-TRUST), Tim 
Hollebeek (DigiCert), Dean Coclin (DigiCert), Bruce Morton (Entrust DataCard), 
Wendy Brown (Federal PKI), Thomas Connelly (Federal PKI), Doug Beattie 
(GlobalSign), Hugh Mercer (GlobalSign), Atsushi Inaba  (GlobalSign), Hongquan 
Yin  (Microsoft), Hazhar Ismail (MSC Trustgate.com Sdn Bhd), Ahmad Syafiq Md 
Zaini (MSC Trustgate.com Sdn Bhd), Fakrul Radzi (MSC Trustgate.com Sdn Bhd), 
Nazmi Abd Hadi  (MSC Trustgate.com Sdn Bhd), Pedro Fuentes (OISTE), Rich Smith 
(Sectigo), Robin Alden (Sectigo), Tim Callan (Sectigo), Markus Wichmann 
(TeleTrust), Morad Abou Nasser (TeleTrust), Neil Dunbar  (TrustCor), Corey 
Bonnell  (Trustwave), Russ Housley (Vigil Security, LLC), Burkhard Wiegel 
(Zertificon), Peggy Hüpenbecker (Zertificon), Mevre Tunca (Zertificon)


1. Roll Call


The Roll Call was taken.


2. Read Antitrust Statement


The Antitrust/Compliance Statement was read.


3. Review Agenda


Dean Coclin proposed a change in membership status (see below).


4. Approval of minutes from last teleconference


The minutes of the August 5 teleconference were approved with an update to the 
attendance list.


5.  Approval of New Members


The declarations of the following were noted:

*       Certificate Consumer:  Zertificon
*       Interested Party:  Nathalie Weiler

Their membership in the SMCWG was accepted by consensus.  In addition, Dean 
Coclin clarified the status of current Associate Member MSC Trustgate.com Sdn 
Bhd as being eligible as a Certificate Issuer.  A change in membership status 
was accepted by consensus.  As such, the current membership of the SMCWG is:

*       Certificate Issuers:  Actalis, Asseco Data Systems (Certum), BuyPass, 
CFCA, Chunghwa Telecom, Comsign, DigiCert, D-TRUST, eMudhra, Entrust DataCard, 
GDCA, GlobalSign, HARICA, iTrusChina, MSC Trustgate.com, Sectigo, SHECA, SSC, 
SSL.com, SwissSign, TrustCor, Trustwave, TWCA, OISTE Foundation
*       Certificate Consumers:  Microsoft, Mozilla/Thunderbird, Zertificon
*       Associate Members: ACAB Council, U.S. Federal PKI, WebTrust
*       Interested Parties:  Arno Fiedler, PSW, TeleTrusT, Vigil Security, 
Nathalie Weiler


6. Discussion of approach and deliverables


It was agreed to begin a discussion of certificate profiles starting at the 
S/MIME end entity, working up the chain, in comparison to major requirements 
and standards.  The worksheet currently includes aspects of standards from 
Mozilla, Gmail and the US Federal PKI (thanks for Wendy Brown's assistance):



https://docs.google.com/spreadsheets/d/1gEq-o4jU1FWvKBeMoncfmhAUemAgGuvVRSLQb7PedLU/edit?usp=sharing



Certificate Issuers were asked to review their profiles for variance from these 
settings for discussion, with feedback preferred on the public list.



Certificate Consumers were requested if there are technical requirements (must 
have/can't have) imposed by their products or services on certificates.



Ben Wilson was requested to check the profile against the Mozilla program 
requirements.



Pertaining to Serial Number, it was discussed whether the requirement for 64 
unpredictable bits was a legacy of the SHA1 deprecation or a necessary ongoing 
security feature.  It is a requirement of the Mozilla Root Store Policy 5.2.



Pertaining to Signature Algorithm, assistance was requested in either obtaining 
an English translation of BSI TR-03166 or in translating the text from German 
(with particular interest in the use of RSASSA-PSS).  It was noted that ECDSA 
SHA-512 is not supported under Mozilla, with the question if the same applies 
to Thunderbird.



Pertaining to Validity Period, there was discussion relating to the tradeoffs 
between shorter validity for crypto agility as championed in TLS, the use of 
tokens found in many S/MIME implementations, and in use cases such as email 
gateways.  It was proposed that domain certificates would benefit from a 
separate profile.  Discussion to be continued.




6. Any Other Business




Again, WG members are encouraged to submit relevant standards and requirements 
to the public list.


7. Next call


The next call will take place on September 2, 2020 at 11:00am Eastern Time.


Adjourned




_______________________________________________
Public mailing list
[email protected]
https://lists.cabforum.org/mailman/listinfo/public

Reply via email to