Package: ca-cacert
Version: 2011.0523-2
Severity: important

Dear Maintainer,

   * What led up to the situation?

CA-Cert re-signing their root and class3 certificates with SHA-256 + RSA.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

There was nothing to do, as there was no new version of the package.

   * What was the outcome of this action?

I did not have the re-signed certificates, only the old ones.

   * What outcome did you expect instead?

I had expected a timely update of the package including the new
certificates, so I could use them in the certificate chain of my
web server.

For now, I just got those certificates from
http://svn.cacert.org/CAcert/SystemAdministration/signer/re-sign-2016/outputs/{root,class3}_256.crt
but I hope there will be an updated package soon.

Regards,
Wilfried


-- System Information:
Debian Release: stretch/sid
  APT prefers stable-updates
  APT policy: (990, 'stable-updates'), (990, 'testing'), (990, 'stable')
Architecture: i386 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages ca-cacert depends on:
ii  ca-certificates  20160104

ca-cacert recommends no packages.

ca-cacert suggests no packages.

-- no debconf information

Reply via email to