[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#290149: marked as done (ca-certificates: Please include DFN-PCA certificate)



Your message dated Sun, 23 Oct 2011 18:05:38 -0500
with message-id <4EA49DC2.4020702@pbandjelly.org>
and subject line Closing 290149
has caused the Debian Bug report #290149,
regarding ca-certificates: Please include DFN-PCA certificate
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
290149: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=290149
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: ca-certificates
Version: 20040809
Severity: wishlist


The DFN-PCA is "The certification authority for the German Research
Network" (DFN==Deutsches Forschungsnetz; a german inter-University
Network, probably similar to the 'internet2' in the USA).

Quoting their website (http://www.dfn-pca.de/eng/):
[...]
|   On the following pages you will find information about the project
|   "PCA im DFN" ("A PCA in the DFN"). The project establishes a DFN-wide
|   public key certification hierarchy. The DFN PCA issues certificates
|   for other DFN members' CAs and provides assistance in their
|   establishment. Furthermore, the project team offers the services of
|   CAs certified by the DFN PCA. Thus, it is possible to issue user
|   certificates for users or servers whose organizations do not yet
|   operate CAs of their own.
|
|   We support the following certificate formats:
|     * PGP (Version 2.6.xi)
|     * X.509v1 (PEM)
|     * X.509v3 (SSL, S/MIME, ...)
|
[...]
|   Please direct your questions concerning this project via e-mail to
|   dfnpca@dfn-pca.de.
[...]
|   The project DFN-PCA ist funded by the the German National Research adn
|   Education Network (NREN) "Verein zur Förderung eines Deutschen
|   Forschungsnetzes e.V." - [35]DFN-Verein (Society for the Development
|   of a German research network).
[...]

Links to the Certificates and Certificate revokation lists (Babelfished German,
substitute "run out" with "expired"):
http://babelfish.altavista.com/babelfish/tr?url=http%3A%2F%2Fwww.dfn-pca.de%2Fcertification%2Fcacert.html&lp=de_en
http://babelfish.altavista.com/babelfish/tr?url=http%3A%2F%2Fwww.dfn-pca.de%2Fcertification%2Fcrls.html&lp=de_en


Some german universities also have CAs certified by this nationwide CA,
at least mine does and it would be nice if these were also to be included:
https://www.ca.uni-hannover.de/
https://www.ca.uni-hannover.de/certs.html

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-ac8-nfsacl
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages ca-certificates depends on:
ii  debconf                       1.4.41     Debian configuration management sy
ii  openssl                       0.9.7e-3   Secure Socket Layer (SSL) binary a

-- debconf information:
* ca-certificates/enable_crts: brasil.gov.br/brasil.gov.br.crt, mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, mozilla/AddTrust_External_Root.crt, mozilla/AddTrust_Low-Value_Services_Root.crt, mozilla/AddTrust_Public_Services_Root.crt, mozilla/AddTrust_Qualified_Certificates_Root.crt, mozilla/America_Online_Root_Certification_Authority_1.crt, mozilla/America_Online_Root_Certification_Authority_2.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, mozilla/Baltimore_CyberTrust_Root.crt, mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt, mozilla/beTRUSTed_Root_CA.crt, mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, mozilla/Entrust.net_Global_Secure_Personal_CA.crt, mozilla/Entrust.net_Global_Secure_Server_CA.crt, mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, mozilla/Entrust.net_Secure_Personal_CA.crt, mozilla/Entrust.net_Secure_Server_CA.crt, mozilla/Equifax_Secure_CA.crt, mozilla/Equifax_Secure_eBusiness_CA_1.crt, mozilla/Equifax_Secure_eBusiness_CA_2.crt, mozilla/Equifax_Secure_Global_eBusiness_CA.crt, mozilla/GeoTrust_Global_CA.crt, mozilla/GlobalSign_Root_CA.crt, mozilla/GTE_CyberTrust_Global_Root.crt, mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/RSA_Root_Certificate_1.crt, mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt, mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, mozilla/Thawte_Personal_Basic_CA.crt, mozilla/Thawte_Personal_Freemail_CA.crt, mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, mozilla/UTN-USER_First-Network_Applications.crt, mozilla/ValiCert_Class_1_VA.crt, mozilla/ValiC
_Class_2_VA.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_1_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_2_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_Class_3_Public_Primary_OCSP_Responder.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, mozilla/Verisign_RSA_Secure_Server_CA.crt, mozilla/Verisign_Secure_Server_OCSP_Responder.crt, mozilla/Verisign_Time_Stamping_Authority_CA.crt, mozilla/Visa_eCommerce_Root.crt, mozilla/Visa_International_Global_Root_2.crt, quovadis.bm/QuoVadis_Root_Certification_Authority.crt, signet.pl/signet_ca1_pem.crt, signet.pl/signet_ca2_pem.crt, signet.pl/signet_ca3_pem.crt, signet.pl/signet_ocspklasa2_pem.crt, signet.pl/signet_ocspklasa3_pem.crt, signet.pl/signet_pca2_pem.crt, signet.pl/signet_pca3_pem.crt, signet.pl/signet_rootca_pem.crt, signet.pl/signet_tsa1_pem.crt, spi-inc.org/spi-ca.crt
  ca-certificates/new_crts:
* ca-certificates/trust_new_crts: yes


--- End Message ---
--- Begin Message ---
Thanks.

-- 
Kind regards,
Michael Shuler


--- End Message ---

Reply to: