Package: ca-cacert Version: 2011.0523-2 Severity: important Dear Maintainer,
* What led up to the situation? CA-Cert re-signing their root and class3 certificates with SHA-256 + RSA. * What exactly did you do (or not do) that was effective (or ineffective)? There was nothing to do, as there was no new version of the package. * What was the outcome of this action? I did not have the re-signed certificates, only the old ones. * What outcome did you expect instead? I had expected a timely update of the package including the new certificates, so I could use them in the certificate chain of my web server. For now, I just got those certificates from http://svn.cacert.org/CAcert/SystemAdministration/signer/re-sign-2016/outputs/{root,class3}_256.crt but I hope there will be an updated package soon. Regards, Wilfried -- System Information: Debian Release: stretch/sid APT prefers stable-updates APT policy: (990, 'stable-updates'), (990, 'testing'), (990, 'stable') Architecture: i386 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages ca-cacert depends on: ii ca-certificates 20160104 ca-cacert recommends no packages. ca-cacert suggests no packages. -- no debconf information