-
Notifications
You must be signed in to change notification settings - Fork 122
SC-081: Introduce Schedule of Reducing Validity and Data Reuse Periods #553
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
dzacharo
merged 22 commits into
main
from
Reduce-Max-Validity-and-Data-Reuse-Periods-Over-Time
May 16, 2025
+52
−9
Merged
Changes from all commits
Commits
Show all changes
22 commits
Select commit
Hold shift + click to select a range
76ca560
Introduce Schedule of Reducing Validity and Data Reuse Periods
clintwilson 477f603
Update Table Row header
clintwilson 69cea54
Update SC-081
clintwilson d43b5e7
Update Tables
clintwilson 87b4ebb
Fix capitalization
clintwilson 51548be
Increase SII reuse period
clintwilson abf6c4e
Shift timeline of Validity Period
clintwilson 09f2ab7
Fix other 47-day timeline dates
clintwilson 5f7247e
Delay 10 day DCV reuse date
clintwilson 91724f5
Fixing workflow file
clintwilson faa3330
Introduce Schedule of Reducing Validity and Data Reuse Periods
clintwilson 3702e34
Update Table Row header
clintwilson cf82d5b
Update SC-081
clintwilson 7a3d5ed
Update Tables
clintwilson a848c0e
Fix capitalization
clintwilson 7eb37e8
Increase SII reuse period
clintwilson 8556768
Shift timeline of Validity Period
clintwilson 6722733
Fix other 47-day timeline dates
clintwilson a793e11
Delay 10 day DCV reuse date
clintwilson c46ddfa
Fixing workflow file
clintwilson b9d772f
Merge remote-tracking branch 'origin/Reduce-Max-Validity-and-Data-Reu…
dzacharo 61e0350
Update version number and recent changes.
dzacharo File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,11 +1,11 @@ | ||
| --- | ||
| title: Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates | ||
|
|
||
| subtitle: Version 2.1.4 | ||
| subtitle: Version 2.1.5 | ||
| author: | ||
| - CA/Browser Forum | ||
|
|
||
| date: 1-March-2025 | ||
| date: 16-May-2025 | ||
|
|
||
| copyright: | | ||
| Copyright 2025 CA/Browser Forum | ||
|
|
@@ -147,7 +147,8 @@ The following Certificate Policy identifiers are reserved for use by CAs to asse | |
| | 2.1.1 | SC79 | Allow more than one Certificate Policy in a Cross-Certified Subordinate CA Certificate | 30-Sep-2024 | 14-Nov-2024 | | ||
| | 2.1.2 | SC80 | Strengthen WHOIS lookups and Sunset Methods 3.2.2.4.2 and 3.2.2.4.15 | 7-Nov-2024 | 16-Dec-2024 | | ||
| | 2.1.3 | SC83 | Winter 2024-2025 Cleanup Ballot | 23-Jan-2025 | 24-Feb-2025 | | ||
| | 2.1.4 | SC84 | DNS Labeled with ACME Account ID Validation Method | 28-Jan-2025 | 1-Mar-2025 | | ||
| | 2.1.4 | SC84 | DNS Labeled with ACME Account ID Validation Method | 28-Jan-2025 | 1-Mar-2025 | | ||
| | 2.1.5 | SC81 | Introduce Schedule of Reducing Validity and Data Reuse Periods | 11-Apr-2025 | 16-May-2025 | | ||
|
|
||
| \* Effective Date and Additionally Relevant Compliance Date(s) | ||
|
|
||
|
|
@@ -199,14 +200,21 @@ The following Certificate Policy identifiers are reserved for use by CAs to asse | |
| | 2023-01-15 | 7.2.2 | Sharded or partitioned CRLs MUST have a distributionPoint | | ||
| | 2023-07-15 | 4.9.1.1 and 7.2.2 | New CRL entries MUST have a revocation reason code | | ||
| | 2023-09-15 | Section 7 (and others) | CAs MUST use the updated Certificate Profiles passed in Version 2.0.0 | | ||
| | 2024-03-15 | 4.9.7 | CAs MUST generate and publish CRLs. | ||
| | 2024-03-15 | 4.9.7 | CAs MUST generate and publish CRLs. | ||
| | 2024-09-15 | 4.3.1.2 | The CA SHOULD implement a Linting process to test the technical conformity of the to-be-issued Certificate with these Requirements. | | ||
| | 2025-01-15 | 4.9.9 | Subscriber Certificate OCSP responses MUST be available 15 minutes after issuance. | | ||
| | 2025-01-15 | 3.2.2.4 | CAs MUST NOT rely on HTTPS websites to identify Domain Contact information. CAs MUST rely on IANA resources for identifying Domain Contact information. | | ||
| | 2025-03-15 | 4.3.1.2 | The CA SHALL implement a Linting process to test the technical conformity of the to-be-issued Certificate with these Requirements. | | ||
| | 2025-03-15 | 8.7 | The CA SHOULD use a Linting process to test the technical accuracy of already issued Certificates against the sample set chosen for Self-Audits. | | ||
| | 2025-03-15 | 3.2.2.9 | CAs MUST corroborate the results of domain validation and CAA checks from multiple Network Perspectives where specified. | | ||
| | 2025-07-15 | 3.2.2.4 | CAs MUST NOT rely on Methods 3.2.2.4.2 and 3.2.2.4.15 to issue Subscriber Certificates. | | ||
| | 2026-03-15 | 4.2.1 | Subject Identity Information validation maximum data reuse period is 398 days. | | ||
| | 2026-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 200 days. | | ||
| | 2026-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 200 days. | | ||
| | 2027-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 100 days. | | ||
| | 2027-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 100 days. | | ||
| | 2029-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 10 days. | | ||
| | 2026-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 47 days. | | ||
|
|
||
| ## 1.3 PKI Participants | ||
|
|
||
|
|
@@ -1234,15 +1242,35 @@ The certificate request MAY include all factual information about the Applicant | |
|
|
||
| Applicant information MUST include, but not be limited to, at least one Fully-Qualified Domain Name or IP address to be included in the Certificate's `subjectAltName` extension. | ||
|
|
||
| [Section 6.3.2](#632-certificate-operational-periods-and-key-pair-usage-periods) limits the validity period of Subscriber Certificates. The CA MAY use the documents and data provided in [Section 3.2](#32-initial-identity-validation) to verify certificate information, or may reuse previous validations themselves, provided that the CA obtained the data or document from a source specified under [Section 3.2](#32-initial-identity-validation) or completed the validation itself no more than 825 days prior to issuing the Certificate. For validation of Domain Names and IP Addresses according to Section 3.2.2.4 and 3.2.2.5, any data, document, or completed validation used MUST be obtained no more than 398 days prior to issuing the Certificate. | ||
| [Section 6.3.2](#632-certificate-operational-periods-and-key-pair-usage-periods) limits the validity period of Subscriber Certificates. | ||
|
|
||
| The CA MAY use the documents and data provided in [Section 3.2](#32-initial-identity-validation) to verify certificate information, or may reuse previous validations themselves, provided that the CA obtained the data or document from a source specified under [Section 3.2](#32-initial-identity-validation) or completed the validation itself within the maximum number of days prior to issuing the Certificate, as defined in the following table: | ||
|
|
||
| Table: Subject Identity Information validation data reuse periods | ||
|
|
||
| | __Certificate issued on or after__ | __Certificate issued before__ | __Maximum data reuse period__ | | ||
| | -- | -- | -- | | ||
| | | March 15, 2026 | 825 days | | ||
| | March 15, 2026 | | 398 days | | ||
|
|
||
| For validation of Domain Names and IP Addresses according to [Section 3.2.2.4](#3224-validation-of-domain-authorization-or-control) and [Section 3.2.2.5](#3225-authentication-for-an-ip-address), any data, document, or completed validation used MUST be obtained within the maximum number of days prior to issuing the Certificate, as defined in the following table: | ||
|
|
||
| Table: Domain Name and IP Address validation data reuse periods | ||
|
|
||
| | __Certificate issued on or after__ | __Certificate issued before__ | __Maximum data reuse period__ | | ||
| | -- | -- | -- | | ||
| | | March 15, 2026 | 398 days | | ||
| | March 15, 2026 | March 15, 2027 | 200 days | | ||
| | March 15, 2027 | March 15, 2029 | 100 days | | ||
| | March 15, 2029 | | 10 days | | ||
|
|
||
| In no case may a prior validation be reused if any data or document used in the prior validation was obtained more than the maximum time permitted for reuse of the data or document prior to issuing the Certificate. | ||
|
|
||
| After the change to any validation method specified in the Baseline Requirements or EV Guidelines, a CA may continue to reuse validation data or documents collected prior to the change, or the validation itself, for the period stated in this BR 4.2.1 unless otherwise specifically provided in a ballot. | ||
| After the change to any validation method specified in the Baseline Requirements or EV Guidelines, a CA may continue to reuse validation data or documents collected prior to the change, or the validation itself, for the period stated in [Section 4.2.1](#421-performing-identification-and-authentication-functions) unless otherwise specifically provided in a ballot. | ||
|
|
||
| The CA SHALL develop, maintain, and implement documented procedures that identify and require additional verification activity for High Risk Certificate Requests prior to the Certificate's approval, as reasonably necessary to ensure that such requests are properly verified under these Requirements. | ||
|
|
||
| If a Delegated Third Party fulfills any of the CA's obligations under this section , the CA SHALL verify that the process used by the Delegated Third Party to identify and further verify High Risk Certificate Requests provides at least the same level of assurance as the CA's own processes. | ||
| If a Delegated Third Party fulfills any of the CA's obligations under this section, the CA SHALL verify that the process used by the Delegated Third Party to identify and further verify High Risk Certificate Requests provides at least the same level of assurance as the CA's own processes. | ||
|
|
||
| ### 4.2.2 Approval or rejection of certificate applications | ||
|
|
||
|
|
@@ -1970,7 +1998,22 @@ The CA SHALL protect its Private Key in a system or device that has been validat | |
|
|
||
| ### 6.3.2 Certificate operational periods and key pair usage periods | ||
|
|
||
| Subscriber Certificates issued on or after 1 September 2020 SHOULD NOT have a Validity Period greater than 397 days and MUST NOT have a Validity Period greater than 398 days. | ||
| Subscriber Certificates issued before 15 March 2026 SHOULD NOT have a Validity Period greater than 397 days and MUST NOT have a Validity Period greater than 398 days. | ||
|
|
||
| Subscriber Certificates issued on or after 15 March 2026 and before 15 March 2027 SHOULD NOT have a Validity Period greater than 199 days and MUST NOT have a Validity Period greater than 200 days. | ||
|
|
||
| Subscriber Certificates issued on or after 15 March 2027 and before 15 March 2029 SHOULD NOT have a Validity Period greater than 99 days and MUST NOT have a Validity Period greater than 100 days. | ||
|
|
||
| Subscriber Certificates issued on or after 15 March 2029 SHOULD NOT have a Validity Period greater than 46 days and MUST NOT have a Validity Period greater than 47 days. | ||
|
|
||
| Table: Reference for maximum Validity Periods of Subscriber Certificates | ||
clintwilson marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| | __Certificate issued on or after__ | __Certificate issued before__ | __Maximum Validity Period__ | | ||
| | -- | -- | -- | | ||
| | | March 15, 2026 | 398 days | | ||
| | March 15, 2026 | March 15, 2027 | 200 days | | ||
| | March 15, 2027 | March 15, 2029 | 100 days | | ||
| | March 15, 2029 | | 47 days | | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. dm!!! apple. |
||
|
|
||
| For the purpose of calculations, a day is measured as 86,400 seconds. Any amount of time greater than this, including fractional seconds and/or leap seconds, shall represent an additional day. For this reason, Subscriber Certificates SHOULD NOT be issued for the maximum permissible time by default, in order to account for such adjustments. | ||
|
|
||
|
|
||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.