Skip to content

Commit e0da553

Browse files
authored
CSC-20 (#30)
* Restore EV guidelines version reference * Capitalize "MUST NOT" (#19) * Assign ballot number, fix ballot name * Add effective date
1 parent 93ee997 commit e0da553

1 file changed

Lines changed: 6 additions & 3 deletions

File tree

docs/CSBR.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates
3-
subtitle: Version 3.4.0
3+
subtitle: Version 3.5.0
44

55
author:
66
- CA/Browser Forum
7-
date: September 5, 2023
7+
date: December 7, 2023
88

99
copyright: |
1010
Copyright 2023 CA/Browser Forum
@@ -55,6 +55,7 @@ The following Certificate Policy Identifier is reserved for use by CAs as a requ
5555
| 3.2 | CSC-17 | Subscriber Private Key Protection Extension | 28 October 2022 |
5656
| 3.3 | CSC-18 | Update Revocation Requirements | 29 June 2023 |
5757
| 3.4 | CSC-19 | Remove SSL BR References | 5 September 2023 |
58+
| 3.5 | CSC-20 | Restore Version Reference to EV Guidelines | 7 December 2023 |
5859

5960

6061
### 1.2.2 Relevant Dates
@@ -359,6 +360,8 @@ FIPS 140-3, Federal Information Processing Standards Publication - Security Requ
359360

360361
FIPS 186-4, Federal Information Processing Standards Publication - Digital Signature Standard (DSS), Information Technology Laboratory, National Institute of Standards and Technology, July 2013.
361362

363+
Guidelines for the Issuance and Management of Extended Validation Certificates, Version 1.7.2, available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-EV-Guidelines-v1.7.2.pdf.
364+
362365
ISO 21188:2006, Public key infrastructure for financial services -- Practices and policy framework.
363366

364367
Network and Certificate System Security Requirements, Version 1.7, available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf.
@@ -633,7 +636,7 @@ For EV Code Signing Certificates, use of documents, data, and previous validatio
633636

634637
### 4.2.2 Approval or rejection of certificate applications
635638

636-
CAs MUST not issue new or replacement Code Signing Certificates to an entity that the CA determined intentionally signed Suspect Code. The CA MUST keep meta-data about the reason for revoking a Code Signing Certificate as proof that the Code Signing Certificate was not revoked because the Applicant was intentionally signing Suspect Code.
639+
CAs MUST NOT issue new or replacement Code Signing Certificates to an entity that the CA determined intentionally signed Suspect Code. The CA MUST keep meta-data about the reason for revoking a Code Signing Certificate as proof that the Code Signing Certificate was not revoked because the Applicant was intentionally signing Suspect Code.
637640

638641
CAs MAY issue new or replacement Code Signing Certificates to an entity who is the victim of a documented Takeover Attack, resulting in either a loss of control of their code-signing service or loss of the Private Key associated with their Code Signing Certificate.
639642

0 commit comments

Comments
 (0)