~ubuntu-branches/ubuntu/natty/ca-certificates/natty

« back to all changes in this revision

Viewing changes to spi-inc.org/SPI_CA_2006-cacert.eml

  • Committer: Bazaar Package Importer
  • Author(s): Philipp Kern
  • Date: 2008-08-09 14:58:24 UTC
  • mto: This revision was merged to the branch mainline in revision 8.
  • Revision ID: james.westby@ubuntu.com-20080809145824-4g3eot1a99uxmwzj
* New cacert.org.pem joining both CACert Class 1 and Class 3 certificates.
  This file can be used for proper certificate chaining if CACert
  server certificates are used.  The old class3.pem and root.pem
  certificates are deprecated.  This new file could safely serve as
  a replacement for both.  (Closes: #494343)
* This also reintroduces the old name for the CACert certificate,
  thus closing a long-standing bug about its rename to root.crt.
  (Closes: #413766)

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Return-Path: <ukai@lists.debian.or.jp>
2
 
X-Original-To: ukai@ukai.jp
3
 
Delivered-To: ukai@ukai.jp
4
 
Received: from osdn.debian.or.jp (osdn.debian.or.jp [61.215.208.41])
5
 
        by mint.ukai.jp (Postfix) with ESMTP id 206B7D41E6
6
 
        for <ukai@ukai.jp>; Thu, 17 Aug 2006 06:02:29 +0900 (JST)
7
 
Received: by osdn.debian.or.jp (Postfix, from userid 1001)
8
 
        id EDABBC31A6; Thu, 17 Aug 2006 06:02:30 +0900 (JST)
9
 
X-Return-Path: <schultmc@amellus.com>
10
 
X-Original-To: ukai@debian.or.jp
11
 
Delivered-To: ukai@debian.or.jp
12
 
Received: from mx1.amellus.net (tanzanite.amellus.net [72.232.8.122])
13
 
        by osdn.debian.or.jp (Postfix) with ESMTP id 8AC35C31A6
14
 
        for <ukai@debian.or.jp>; Thu, 17 Aug 2006 06:02:28 +0900 (JST)
15
 
Received: from localhost (localhost.localdomain [127.0.0.1])
16
 
        by mx1.amellus.net (Postfix) with ESMTP id CC4DF12C20A;
17
 
        Wed, 16 Aug 2006 16:02:19 -0500 (CDT)
18
 
X-Virus-Scanned: by AWESOM-O (Amavis-new,ClamAV) at mx1.amellus.net
19
 
X-Spam-Score: -102.441
20
 
X-Spam-Level: 
21
 
X-Spam-Status: No, score=-102.441 tagged_above=-999 required=4.2
22
 
        tests=[AWL=0.024, BAYES_00=-2.599, FORGED_RCVD_HELO=0.135,
23
 
        SPF_PASS=-0.001, UPPERCASE_25_50=0, USER_IN_WHITELIST=-100]
24
 
Received: from mx1.amellus.net ([127.0.0.1])
25
 
        by localhost (tanzanite.amellus.net [127.0.0.1]) (amavisd-new, port 10024)
26
 
        with ESMTP id Dpf+8VjxZOkr; Wed, 16 Aug 2006 16:02:11 -0500 (CDT)
27
 
Received: from cartman.hq.amellus.com (c-68-58-138-203.hsd1.in.comcast.net [68.58.138.203])
28
 
        by mx1.amellus.net (Postfix) with ESMTP id 72CE512C17F;
29
 
        Wed, 16 Aug 2006 16:02:11 -0500 (CDT)
30
 
Received: by cartman.hq.amellus.com (Postfix, from userid 1000)
31
 
        id 87D66479DE; Wed, 16 Aug 2006 17:03:13 -0400 (EDT)
32
 
Date: Wed, 16 Aug 2006 17:03:13 -0400
33
 
From: Michael Schultheiss <schultmc@spi-inc.org>
34
 
To: Fumitoshi UKAI <ukai@debian.or.jp>
35
 
Cc: hostmaster@spi-inc.org
36
 
Subject: spi-inc.org CA certificate
37
 
Message-ID: <20060816210313.GD6360@amellus.com>
38
 
MIME-Version: 1.0
39
 
Content-Type: multipart/signed; micalg=pgp-sha1;
40
 
        protocol="application/pgp-signature"; boundary="+g7M9IMkV8truYOl"
41
 
Content-Disposition: inline
42
 
User-Agent: Mutt/1.5.12-2006-07-14
43
 
X-Bogosity: Ham, tests=bogofilter, spamicity=0.296304, version=0.94.4
44
 
 
45
 
 
46
 
--+g7M9IMkV8truYOl
47
 
Content-Type: multipart/mixed; boundary="pf9I7BMVVzbSWLtt"
48
 
Content-Disposition: inline
49
 
 
50
 
 
51
 
--pf9I7BMVVzbSWLtt
52
 
Content-Type: text/plain; charset=us-ascii
53
 
Content-Disposition: inline
54
 
Content-Transfer-Encoding: quoted-printable
55
 
 
56
 
The current SPI CA certificate expires on 2007-01-14.  I have generated
57
 
a new SPI CA certificate, signed by the current SPI CA certificate, that
58
 
expires on 2016-08-13 (attached).  The new certificate should be
59
 
included in the Debian ca-certificates package ASAP.
60
 
 
61
 
--=20
62
 
----------------------------
63
 
Michael Schultheiss
64
 
E-mail: schultmc@spi-inc.org
65
 
 
66
 
--pf9I7BMVVzbSWLtt
67
 
Content-Type: text/plain; charset=us-ascii
68
 
Content-Disposition: attachment; filename="SPI_CA_2006-cacert.pem"
69
 
 
70
 
-----BEGIN CERTIFICATE-----
71
 
MIIGFTCCBX6gAwIBAgIBEDANBgkqhkiG9w0BAQUFADCBvjELMAkGA1UEBhMCVVMx
72
 
EDAOBgNVBAgTB0luZGlhbmExFTATBgNVBAcTDEluZGlhbmFwb2xpczEoMCYGA1UE
73
 
ChMfU29mdHdhcmUgaW4gdGhlIFB1YmxpYyBJbnRlcmVzdDETMBEGA1UECxMKaG9z
74
 
dG1hc3RlcjEgMB4GA1UEAxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxJTAjBgkq
75
 
hkiG9w0BCQEWFmhvc3RtYXN0ZXJAc3BpLWluYy5vcmcwHhcNMDYwODE2MjA0NjUy
76
 
WhcNMTYwODEzMjA0NjUyWjCBvDELMAkGA1UEBhMCVVMxEDAOBgNVBAgTB0luZGlh
77
 
bmExFTATBgNVBAcTDEluZGlhbmFwb2xpczEoMCYGA1UEChMfU29mdHdhcmUgaW4g
78
 
dGhlIFB1YmxpYyBJbnRlcmVzdDETMBEGA1UECxMKSG9zdG1hc3RlcjEeMBwGA1UE
79
 
AxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MSUwIwYJKoZIhvcNAQkBFhZob3N0bWFz
80
 
dGVyQHNwaS1pbmMub3JnMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
81
 
uTlCOrOYvCe0Qszlz90rVIQkS2UDa7R+qCTkRE5ipKC+3OZXGgv2EOYk/IOuCE3D
82
 
8+tlTAl8MwvmwOHgL0GWnjoluR95narhNiV9Px8xyL2Z8kctwrWXbEii0Ot48VcN
83
 
IQMDW5GK8Ww5puMKZr8+bXF2HFzkt8gwaCtrojcF4fLGcm3//bR13CKWbOzacANZ
84
 
gAi00pD70ppjJU/uNVOe5HX6x/Id+50G6jwasanEzhteYJdbbHaMqrL4J6XbTwgJ
85
 
ZciB0ifOZkwTBvQiRJpTkTWPyn/HptMbJGOwwiNbcgtWV7QVLW1GB3HYVum47Zwp
86
 
XcXVM4Fs4XLwfx1Ti87LGdAJJYDS5K1F2prHKW5MsmFLJg61Nd6dZPRDLJLaOPEq
87
 
0Jxa1NdfDjJ8rXOIcuLRAozjBui23vUhfOW9z4kpVIg+c+ylV2Oh/7f+fO731P7E
88
 
AqsTFmiU7svcvkm2OKslolpnQ+pqGFLM4laQE/Q0kjogm7LiOpRssBW/ZfZ7pPLZ
89
 
Ru0/AXrgKwQIM8mLazwlD3wHKPRElhIkxSv4qZ95zgJo6ky/7BpzZ/OAlz3BICbN
90
 
WQhW/MBQVFiC6ivhjDq3AzgyykLShB0eIMRN0SBfTy3/aNfIJbqLmTNookXPoSP7
91
 
+mg5OVzVBvDv5ZskWSl8kJB1DzJbN+DOr/i8V3Ugl90CAwEAAaOCAZ0wggGZMB0G
92
 
A1UdDgQWBBTON+buqfoMXkWdtvObUS11tnY77DCB6wYDVR0jBIHjMIHggBQHrehB
93
 
HX+91r8bgXo/jEuI3gTS+qGBxKSBwTCBvjELMAkGA1UEBhMCVVMxEDAOBgNVBAgT
94
 
B0luZGlhbmExFTATBgNVBAcTDEluZGlhbmFwb2xpczEoMCYGA1UEChMfU29mdHdh
95
 
cmUgaW4gdGhlIFB1YmxpYyBJbnRlcmVzdDETMBEGA1UECxMKaG9zdG1hc3RlcjEg
96
 
MB4GA1UEAxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxJTAjBgkqhkiG9w0BCQEW
97
 
Fmhvc3RtYXN0ZXJAc3BpLWluYy5vcmeCAQAwDwYDVR0TAQH/BAUwAwEB/zARBglg
98
 
hkgBhvhCAQEEBAMCAQYwCQYDVR0SBAIwADArBglghkgBhvhCAQ0EHhYcVGlueUNB
99
 
IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAhBgNVHREEGjAYgRZob3N0bWFzdGVyQHNw
100
 
aS1pbmMub3JnMAsGA1UdDwQEAwIBBjANBgkqhkiG9w0BAQUFAAOBgQA5HQcqwPE/
101
 
RaN8cb8H1G34rkvSEsj4l8UIivMFEWIKnF3SQT8KVcD7j/eJuhMazwRlTs8Rnu6V
102
 
/uTC10w7SS6gELwDqAzR4PiXTzfkW8OJemyQn6JWXKfq2pR1n4fvwEn7htjeNS69
103
 
iFKlFXyE9j2jhGaps1CKHfe1YX0MuwO4Jw==
104
 
-----END CERTIFICATE-----
105
 
 
106
 
--pf9I7BMVVzbSWLtt--
107
 
 
108
 
--+g7M9IMkV8truYOl
109
 
Content-Type: application/pgp-signature; name="signature.asc"
110
 
Content-Description: Digital signature
111
 
Content-Disposition: inline
112
 
 
113
 
-----BEGIN PGP SIGNATURE-----
114
 
Version: GnuPG v1.4.5 (GNU/Linux)
115
 
 
116
 
iD8DBQFE44gRyJBzD6P54w4RAkuOAJ4xN0tA3aw9CjFJKpbLy4G/OliU7ACdEbEB
117
 
4Mnt8skHQ+OQVDtsyVySyg4=
118
 
=Xztd
119
 
-----END PGP SIGNATURE-----
120
 
 
121
 
--+g7M9IMkV8truYOl--