Let's Encrypt votes Yes on Ballot SC-076v2.

On Thu, Sep 26, 2024 at 12:01 PM Aaron Gable via Servercert-wg <
servercert-wg@cabforum.org> wrote:

> *Purpose of Ballot*
>
> This is v2 of this ballot; you can see the discussion thread for v1 here:
> https://lists.cabforum.org/pipermail/servercert-wg/2024-August/004798.html
>
> This ballot attempts to address three concerns:
> - The confusion around "reserved" serials, which do not actually exist
> because all Precertificate serials are assumed to also exist in
> corresponding Certificates and are therefore actually "assigned";
> - Confusion around whether, and how quickly, OCSP responders must begin
> providing authoritative responses for Certificates and Precertificates; and
> - Confusion around whether and how the OCSP requirements apply to
> Certificates which do not contain an AIA OCSP URL, but for which the CA's
> OCSP responder is still willing to provide responses.
>
> These concerns have been previously discussed in this Mozilla policy bug
> <https://github.com/mozilla/pkipolicy/issues/280>, this ServerCert WG bug
> <https://github.com/cabforum/servercert/issues/422>, and this Bugzilla
> incident <https://bugzilla.mozilla.org/show_bug.cgi?id=1905419>.
>
> It addresses these concerns by:
> - Stating that OCSP responses must be available within 15 minutes of
> signing a certificate containing an AIA OCSP URL;
> - Removing the concept of a "reserved" serial entirely;
> - Moving all OCSP requirements into Section 4.9.9, leaving Section 4.9.10
> (which RFC 3647 says is meant to place requirements on relying parties, not
> on CAs) empty; and
> - Organizing the requirements in Section 4.9.9 into three clusters:
>   - Definitions of "validity interval", "assigned", and "unassigned";
>   - Requirements on OCSP Responders, which apply only to responses from
> AIA OCSP URLs found in issued certs; and
>   - Requirements on OCSP Responses, which apply to all responses
> regardless of whether the certificate in question has an AIA OCSP URL.
>
> GitHub PR representing this ballot:
> https://github.com/cabforum/servercert/pull/535
> Rendered view of the resulting text:
> https://github.com/cabforum/servercert/blob/a8a36690802250cdbe508a6c1f99f700a5357bd3/docs/BR.md#499-on-line-revocationstatus-checking-availability
>
> *Motion*
>
> The following motion has been proposed by Aaron Gable (Let's Encrypt /
> ISRG), and is endorsed by Ben Wilson (Mozilla) and Antonis Eleftheriadis
> (HARICA).
>
> *Motion Begins*
>
> Modify the "Baseline Requirements for the Issuance and Management of
> Publicly-Trusted TLS Server Certificates", based on Version 2.0.6, as
> specified in the following redline:
>
>
> https://github.com/cabforum/servercert/compare/929d9b4a1ed1f13f92f6af672ad6f6a2153b8230...a8a36690802250cdbe508a6c1f99f700a5357bd3
>
> *Motion Ends*
>
> This ballot proposes a Final Maintenance Guideline. The procedure for
> approval of this ballot is as follows:
>
>
> *Discussion Period (at least 7 days)*
>
> Start: August 29, 2024 19:00 UTC
> End: September 26, 2024 19:00 UTC
>
> *Voting Period (7 days)*
>
> Start: September 26, 2024 19:00 UTC
> End: October 3, 2024 19:00 UTC
> _______________________________________________
> Servercert-wg mailing list
> Servercert-wg@cabforum.org
> https://lists.cabforum.org/mailman/listinfo/servercert-wg
>
_______________________________________________
Servercert-wg mailing list
Servercert-wg@cabforum.org
https://lists.cabforum.org/mailman/listinfo/servercert-wg

Reply via email to