Your message dated Thu, 21 May 2015 10:00:15 +0000 with message-id <e1yvngx-0003ja...@franck.debian.org> and subject line Bug#785423: fixed in ca-cacert 2011.0523-1 has caused the Debian Bug report #785423, regarding ITP: ca-cacert -- CAcert.org root certificates to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 785423: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785423 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: wnpp Severity: wishlist X-Debbugs-CC: debian-de...@lists.debian.org Package name: ca-cacert Version: 2011.0523 Upstream Author: CAcert.org License: https://www.cacert.org/policy/RootDistributionLicense.html URL: https://www.cacert.org/index.php?id=3 Vcs-Browser: http://anonscm.debian.org/cgit/collab-maint/ca-cacert.git Description: CAcert.org root certificates This package provides CAcert.org (sub-)root certificates in PEM format. Root certificate allows SSL-based applications to check for the authenticity of certificates issued by the CAcert authority. . CAcert.org is a community-driven Certificate Authority that issues certificates to the public for free. . CAcert's goal is to promote awareness and education on computer security through the use of encryption, specifically by providing cryptographic certificates. These certificates can be used to digitally sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the internet. Any application that supports the Secure Socket Layer Protocol (SSL or TLS) can make use of certificates signed by CAcert, as can any application that uses X.509 certificates, e.g. for encryption or code signing and document signatures. . Please note that Debian can neither confirm nor deny whether CAcert have in any way been audited for trustworthiness or RFC 3647 compliance. -- Regards, Dmitry Smirnov.
signature.asc
Description: This is a digitally signed message part.
--- End Message ---
--- Begin Message ---Source: ca-cacert Source-Version: 2011.0523-1 We believe that the bug you reported is fixed in the latest version of ca-cacert, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 785...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Dmitry Smirnov <only...@debian.org> (supplier of updated ca-cacert package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 16 May 2015 10:32:52 +1000 Source: ca-cacert Binary: ca-cacert Architecture: source all Version: 2011.0523-1 Distribution: unstable Urgency: low Maintainer: Dmitry Smirnov <only...@debian.org> Changed-By: Dmitry Smirnov <only...@debian.org> Description: ca-cacert - CAcert.org root certificates Closes: 785423 Changes: ca-cacert (2011.0523-1) unstable; urgency=low . * Initial release (Closes: #785423). Checksums-Sha1: 6b232fce23c871ad5e9e66c79c5d17210f3db5dd 1883 ca-cacert_2011.0523-1.dsc 146a940040702229c5e4a4c6662fb06ca2ea37ef 3676 ca-cacert_2011.0523.orig.tar.xz d083e7c3eb9c7e6638f6fe89d9f7dc685011c7f9 5340 ca-cacert_2011.0523-1.debian.tar.xz f8ac10d1258bc4b14c34ff0ef0eb13bd8e596b43 7392 ca-cacert_2011.0523-1_all.deb Checksums-Sha256: 44a2bb4abfc17bf49cf2aa20b9e0c94731b8548edcf616daa3a12f22acb10938 1883 ca-cacert_2011.0523-1.dsc 75b2bfe951ec4a5a56e4868425dbf9818653d78d7bae75310372ef298c79f9c1 3676 ca-cacert_2011.0523.orig.tar.xz b82a19c3d11dd3d3eec45f6a8e5c199e1da83c62163b2ed859741fad757e935c 5340 ca-cacert_2011.0523-1.debian.tar.xz 816394882012a3fb6ba8989ef97b33c7fb49e9753c2dfa9bf7f5abca11c04891 7392 ca-cacert_2011.0523-1_all.deb Files: 4822f46b321726492bfef4f5c5cdc69b 1883 misc optional ca-cacert_2011.0523-1.dsc 39494a3d8af7a3f860a2ad9061dae2ac 3676 misc optional ca-cacert_2011.0523.orig.tar.xz 66453fb685c81d9f9c803d2c2502ef5f 5340 misc optional ca-cacert_2011.0523-1.debian.tar.xz 29c0484f570e247f4d81d690d684a1c6 7392 misc optional ca-cacert_2011.0523-1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJVXYa0AAoJEFK2u9lTlo0bSLwP+gLijIUbrcxOOmoxzDgOjLCG ciJcQo9dTJbpJXdryk22AY+p1Bpug+2y1nj+c/UKInX6GollFf0oBjfODohTaoej X1v9EnRtcn1yMgbMcq+QYPL374G5nlJTSXs9e7uQCFg4ddXTiPzel+GuWbuA1ee3 iphm/MYOleonIyNcSGZ5WzkhYcSDY8MKiUXLCVoJza6nT880OMu1RNKEVd2rAp4V cK6q6hMypY7iJhFQyoDe+S/wzLydcBXV9YSty2hCzbLEaOBSmBx7Wts7vQTQgCsI aaxHTYMFwMMSPCUJ2gtD+AvpBfjn1nY8eRtANhxLVzMgvae7II6flobx24P/pavT j/kst5D+yhZqauPfiCGHNYJPN7JnQn/7a39esOlOpWsMb5UAIzq8pmDFMkLL5+sw 3GKnstb9jnXexgwZIvQ+N78sNhBfZo2L7hlolqB42CNte+Ew1cj2aLNigfZb3I3i cB6AgiIXRpb3/sYRYZSawefL+Q9UiZkiJrjciXv8g11waV7U+x7rPfzNeN2BfJau fiWvDepkvOUBSnNqaJlyuVVNuxYC/JvHcnGax3NAwpm0qPqJoSEWA+XtFqR+8ZT+ ar+iBGDMXQGzrQ5Q2Yv1XEaHsRfVZuHFSzanBybQRX+fJmeOdO0ZJ9k0X5+f6wN+ whui7/S0JL8ST33lbdKt =yP7a -----END PGP SIGNATURE-----
--- End Message ---