Commit d4ea87e
Ballot SC-097 (V1): "Sunset all remaining use of SHA-1 signatures in Certificates and CRLs" (cabforum#645)
**Purpose of Ballot SC-097:** This ballot proposes updates to the
Baseline Requirements for the Issuance and Management of
Publicly-Trusted TLS Server Certificates (TLS BRs) to sunset all
remaining use of SHA-1 signatures.
**Background:** Over the years, various sunsets have limited the use of
SHA-1 within the TLS BRs, including:
- [Ballot
118](https://cabforum.org/2014/10/16/ballot-118-sha-1-sunset-passed/)
(2014), which prevented the issuance of any new Subscriber certificates
or Subordinate CA certificates using the SHA-1 signing algorithm.
-
[SC-053](https://cabforum.org/2022/01/26/ballot-sc053-sunset-for-sha-1-ocsp-signing/)
(2022), which prevented delegated OCSP signing using the SHA-1 signing
algorithm.
Despite these sunsets, unexpired and unrevoked Subordinate CA
certificates containing the SHA-1 signature algorithm still exist
([examples](https://docs.google.com/spreadsheets/d/1Fd6U_TB9TEGre_GTruHtaXDjTThqhvmvbX9y_bFFR7Q/edit?gid=76828475#gid=76828475)).
Additionally, Certificate Revocation List (CRL) Distribution Points
disclosed to the CCADB are serving CRLs signed with SHA-1
([examples](https://docs.google.com/spreadsheets/d/1Fd6U_TB9TEGre_GTruHtaXDjTThqhvmvbX9y_bFFR7Q/edit?gid=1653596184#gid=1653596184)).
This ballot is motivated by discussion during the Server Certificate
Working Group Meeting at Face-to-Face 66 [(slide
11](https://drive.google.com/file/d/12QCFfLG6NvGFlnIwU_AVM5mD-tZ4hn89/view?usp=sharing)).
**Scope:** Update Section 7.1.3.2.1 to prohibit all remaining use of the
SHA-1 signature algorithm from appearing in Certificates or status
information responses. As part of this sunset and to promote cyber
hygiene, all unexpired Subordinate CA certificates containing the SHA-1
signature algorithm must be revoked.
This proposal does not prohibit the use of SHA-1 to generate
issuerKeyHash or issuerNameHash values, as currently required by [RFC
5019](https://datatracker.ietf.org/doc/html/rfc5019).
**Justification:** This ballot complements prior efforts within the
CA/Browser Forum to eliminate use of the SHA-1 signature algorithm from
PKI hierarchies adhering to the TLS BRs.
Weaknesses regarding the use of the SHA-1 signature algorithm have been
known for several years. These weaknesses were first
[demonstrated](https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html)
in 2017.
**Benefits of adoption:**
- Promote cyber hygiene.
- Reduce risk of potential collisions due to the inherent weaknesses of
SHA-1, therefore improving security.
- Promote use of modern PKI hierarchies.
- Continuity with other technologies also looking to sunset use of SHA-1
([example](https://www.rfc-editor.org/info/rfc9905))
**Proposed Key Dates:**
- Effective September 15, 2026:
- Prevent use of SHA-1 in new CRLs
- CAs must revoke unexpired Subordinate CA Certificates containing the
SHA-1 signature algorithm.
**Proposal Revision History:**
- [Version 1](cabforum#635) (created
against TLS BR Version 2.1.9)
- Version 2 (this version, created against TLS BR Version 2.2.1)
_(Note: See a "doc" version of this preamble
[here](https://docs.google.com/document/d/1T-kg0Jfjxe1ungGHnyamYddbNogJAgqMJvpasfzhVj4/edit?tab=t.0).)_
---------
Co-authored-by: Dimitris Zacharopoulos <dzacharo@users.noreply.github.com>1 parent 24f38fd commit d4ea87e
1 file changed
+7
-3
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
1 | 1 | | |
2 | 2 | | |
3 | 3 | | |
4 | | - | |
| 4 | + | |
5 | 5 | | |
6 | 6 | | |
7 | 7 | | |
8 | | - | |
| 8 | + | |
9 | 9 | | |
10 | 10 | | |
11 | 11 | | |
| |||
159 | 159 | | |
160 | 160 | | |
161 | 161 | | |
| 162 | + | |
162 | 163 | | |
163 | 164 | | |
164 | 165 | | |
| |||
229 | 230 | | |
230 | 231 | | |
231 | 232 | | |
| 233 | + | |
232 | 234 | | |
233 | 235 | | |
234 | 236 | | |
| |||
3485 | 3487 | | |
3486 | 3488 | | |
3487 | 3489 | | |
3488 | | - | |
| 3490 | + | |
3489 | 3491 | | |
3490 | 3492 | | |
3491 | 3493 | | |
| |||
3510 | 3512 | | |
3511 | 3513 | | |
3512 | 3514 | | |
| 3515 | + | |
| 3516 | + | |
3513 | 3517 | | |
3514 | 3518 | | |
3515 | 3519 | | |
| |||
0 commit comments