Skip to content

Commit 8f131de

Browse files
committed
#574 header is ok, removed spaces
1 parent fbc9a63 commit 8f131de

File tree

1 file changed

+23
-24
lines changed

1 file changed

+23
-24
lines changed

docs/BR.md

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -156,30 +156,29 @@ The following Certificate Policy identifiers are reserved for use by CAs to asse
156156

157157
### 1.2.2 Relevant Dates
158158

159-
160-
| **Compliance** | **Section(s)** | **Summary Description (See Full Text for Details)** |
161-
|----------------|---------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
162-
| 2024-03-15 | 4.9.7 | CAs MUST generate and publish CRLs. |
163-
| 2024-09-15 | 4.3.1.2 | The CA SHOULD implement a Linting process to test the technical conformity of the to-be-issued Certificate with these Requirements. |
164-
| 2025-01-15 | 4.9.9 | Subscriber Certificate OCSP responses MUST be available 15 minutes after issuance. |
165-
| 2025-01-15 | 3.2.2.4 | CAs MUST NOT rely on HTTPS websites to identify Domain Contact information. CAs MUST rely on IANA resources for identifying Domain Contact information. |
166-
| 2025-03-15 | 4.3.1.2 | The CA SHALL implement a Linting process to test the technical conformity of the to-be-issued Certificate with these Requirements. |
167-
| 2025-03-15 | 8.7 | The CA SHOULD use a Linting process to test the technical accuracy of already issued Certificates against the sample set chosen for Self-Audits. |
168-
| 2025-03-15 | 3.2.2.9 | CAs MUST corroborate the results of domain validation and CAA checks from multiple Network Perspectives where specified. |
169-
| 2025-07-15 | 3.2.2.4 | CAs MUST NOT rely on Methods 3.2.2.4.2 and 3.2.2.4.15 to issue Subscriber Certificates. |
170-
| 2025-12-01 | 5.7.1.2 | CAs SHALL assert in section 5.7.1 of their CPS or combined CP/CPS their mass revocation plan, testing, and continuous improvements. |
171-
| 2026-03-15 | 4.2.1 | Subject Identity Information validation maximum data reuse period is 398 days. |
172-
| 2026-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 200 days. |
173-
| 2026-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 200 days. |
174-
| 2026-03-15 | 3.2.2.4 | DNSSEC validation back to the IANA DNSSEC root trust anchor MUST be performed on all DNS queries associated with the validation of domain authorization or control by the Primary Network Perspective. |
175-
| 2026-03-15 | 3.2.2.4 | CAs MUST NOT use local policy to disable DNSSEC validation on any DNS query associated with the validation of domain authorization or control. |
176-
| 2026-03-15 | 3.2.2.8.1 | DNSSEC validation back to the IANA DNSSEC root trust anchor MUST be performed on all DNS queries associated with CAA record lookups performed by the Primary Network Perspective. |
177-
| 2026-03-15 | 3.2.2.8.1 | CAs MUST NOT use local policy to disable DNSSEC validation on any DNS query associated CAA record lookups. |
178-
| 2026-03-15 | 3.2.2.8.1 | DNSSEC-validation errors observed by the Primary Network Perspective (e.g., SERVFAIL) MUST NOT be treated as permission to issue. |
179-
| 2027-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 100 days. |
180-
| 2027-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 100 days. |
181-
| 2029-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 10 days. |
182-
| 2029-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 47 days. |
159+
| **Compliance** | **Section(s)** | **Summary Description (See Full Text for Details)** |
160+
|----------------|----------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
161+
| 2024-03-15 | 4.9.7 | CAs MUST generate and publish CRLs. |
162+
| 2024-09-15 | 4.3.1.2 | The CA SHOULD implement a Linting process to test the technical conformity of the to-be-issued Certificate with these Requirements. |
163+
| 2025-01-15 | 4.9.9 | Subscriber Certificate OCSP responses MUST be available 15 minutes after issuance. |
164+
| 2025-01-15 | 3.2.2.4 | CAs MUST NOT rely on HTTPS websites to identify Domain Contact information. CAs MUST rely on IANA resources for identifying Domain Contact information. |
165+
| 2025-03-15 | 4.3.1.2 | The CA SHALL implement a Linting process to test the technical conformity of the to-be-issued Certificate with these Requirements. |
166+
| 2025-03-15 | 8.7 | The CA SHOULD use a Linting process to test the technical accuracy of already issued Certificates against the sample set chosen for Self-Audits. |
167+
| 2025-03-15 | 3.2.2.9 | CAs MUST corroborate the results of domain validation and CAA checks from multiple Network Perspectives where specified. |
168+
| 2025-07-15 | 3.2.2.4 | CAs MUST NOT rely on Methods 3.2.2.4.2 and 3.2.2.4.15 to issue Subscriber Certificates. |
169+
| 2025-12-01 | 5.7.1.2 | CAs SHALL assert in section 5.7.1 of their CPS or combined CP/CPS their mass revocation plan, testing, and continuous improvements. |
170+
| 2026-03-15 | 4.2.1 | Subject Identity Information validation maximum data reuse period is 398 days. |
171+
| 2026-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 200 days. |
172+
| 2026-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 200 days. |
173+
| 2026-03-15 | 3.2.2.4 | DNSSEC validation back to the IANA DNSSEC root trust anchor MUST be performed on all DNS queries associated with the validation of domain authorization or control by the Primary Network Perspective. |
174+
| 2026-03-15 | 3.2.2.4 | CAs MUST NOT use local policy to disable DNSSEC validation on any DNS query associated with the validation of domain authorization or control. |
175+
| 2026-03-15 | 3.2.2.8.1 | DNSSEC validation back to the IANA DNSSEC root trust anchor MUST be performed on all DNS queries associated with CAA record lookups performed by the Primary Network Perspective. |
176+
| 2026-03-15 | 3.2.2.8.1 | CAs MUST NOT use local policy to disable DNSSEC validation on any DNS query associated CAA record lookups. |
177+
| 2026-03-15 | 3.2.2.8.1 | DNSSEC-validation errors observed by the Primary Network Perspective (e.g., SERVFAIL) MUST NOT be treated as permission to issue. |
178+
| 2027-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 100 days. |
179+
| 2027-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 100 days. |
180+
| 2029-03-15 | 4.2.1 | Domain Name and IP Address validation maximum data reuse period is 10 days. |
181+
| 2029-03-15 | 6.3.2 | Maximum validity period of Subscriber Certificates is 47 days. |
183182

184183
## 1.3 PKI Participants
185184

0 commit comments

Comments
 (0)