[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#785423: marked as done (ITP: ca-cacert -- CAcert.org root certificates)



Your message dated Thu, 21 May 2015 10:00:15 +0000
with message-id <E1YvNGx-0003JA-Vt@franck.debian.org>
and subject line Bug#785423: fixed in ca-cacert 2011.0523-1
has caused the Debian Bug report #785423,
regarding ITP: ca-cacert -- CAcert.org root certificates
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
785423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785423
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
X-Debbugs-CC: debian-devel@lists.debian.org

   Package name: ca-cacert
        Version: 2011.0523
Upstream Author: CAcert.org
        License: https://www.cacert.org/policy/RootDistributionLicense.html
            URL: https://www.cacert.org/index.php?id=3
    Vcs-Browser: http://anonscm.debian.org/cgit/collab-maint/ca-cacert.git
    Description: CAcert.org root certificates
 This package provides CAcert.org (sub-)root certificates in PEM format.
 Root certificate allows SSL-based applications to check for the
 authenticity of certificates issued by the CAcert authority.
 .
 CAcert.org is a community-driven Certificate Authority that issues
 certificates to the public for free.
 .
 CAcert's goal is to promote awareness and education on computer security
 through the use of encryption, specifically by providing cryptographic
 certificates. These certificates can be used to digitally sign and encrypt
 email, authenticate and authorize users connecting to websites and secure
 data transmission over the internet. Any application that supports the
 Secure Socket Layer Protocol (SSL or TLS) can make use of certificates
 signed by CAcert, as can any application that uses X.509 certificates,
 e.g. for encryption or code signing and document signatures.
 .
 Please note that Debian can neither confirm nor deny whether CAcert
 have in any way been audited for trustworthiness or RFC 3647 compliance.

-- 
Regards,
 Dmitry Smirnov.

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---
--- Begin Message ---
Source: ca-cacert
Source-Version: 2011.0523-1

We believe that the bug you reported is fixed in the latest version of
ca-cacert, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 785423@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dmitry Smirnov <onlyjob@debian.org> (supplier of updated ca-cacert package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 16 May 2015 10:32:52 +1000
Source: ca-cacert
Binary: ca-cacert
Architecture: source all
Version: 2011.0523-1
Distribution: unstable
Urgency: low
Maintainer: Dmitry Smirnov <onlyjob@debian.org>
Changed-By: Dmitry Smirnov <onlyjob@debian.org>
Description:
 ca-cacert  - CAcert.org root certificates
Closes: 785423
Changes:
 ca-cacert (2011.0523-1) unstable; urgency=low
 .
   * Initial release (Closes: #785423).
Checksums-Sha1:
 6b232fce23c871ad5e9e66c79c5d17210f3db5dd 1883 ca-cacert_2011.0523-1.dsc
 146a940040702229c5e4a4c6662fb06ca2ea37ef 3676 ca-cacert_2011.0523.orig.tar.xz
 d083e7c3eb9c7e6638f6fe89d9f7dc685011c7f9 5340 ca-cacert_2011.0523-1.debian.tar.xz
 f8ac10d1258bc4b14c34ff0ef0eb13bd8e596b43 7392 ca-cacert_2011.0523-1_all.deb
Checksums-Sha256:
 44a2bb4abfc17bf49cf2aa20b9e0c94731b8548edcf616daa3a12f22acb10938 1883 ca-cacert_2011.0523-1.dsc
 75b2bfe951ec4a5a56e4868425dbf9818653d78d7bae75310372ef298c79f9c1 3676 ca-cacert_2011.0523.orig.tar.xz
 b82a19c3d11dd3d3eec45f6a8e5c199e1da83c62163b2ed859741fad757e935c 5340 ca-cacert_2011.0523-1.debian.tar.xz
 816394882012a3fb6ba8989ef97b33c7fb49e9753c2dfa9bf7f5abca11c04891 7392 ca-cacert_2011.0523-1_all.deb
Files:
 4822f46b321726492bfef4f5c5cdc69b 1883 misc optional ca-cacert_2011.0523-1.dsc
 39494a3d8af7a3f860a2ad9061dae2ac 3676 misc optional ca-cacert_2011.0523.orig.tar.xz
 66453fb685c81d9f9c803d2c2502ef5f 5340 misc optional ca-cacert_2011.0523-1.debian.tar.xz
 29c0484f570e247f4d81d690d684a1c6 7392 misc optional ca-cacert_2011.0523-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=yP7a
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: