Package: ca-certificates
Version: 20040809
Severity: wishlist

The DFN-PCA is "The certification authority for the German Research
Network" (DFN==Deutsches Forschungsnetz; a german inter-University
Network, probably similar to the 'internet2' in the USA).

Quoting their website (http://www.dfn-pca.de/eng/):
[...]
|   On the following pages you will find information about the project
|   "PCA im DFN" ("A PCA in the DFN"). The project establishes a DFN-wide
|   public key certification hierarchy. The DFN PCA issues certificates
|   for other DFN members' CAs and provides assistance in their
|   establishment. Furthermore, the project team offers the services of
|   CAs certified by the DFN PCA. Thus, it is possible to issue user
|   certificates for users or servers whose organizations do not yet
|   operate CAs of their own.
|
|   We support the following certificate formats:
|     * PGP (Version 2.6.xi)
|     * X.509v1 (PEM)
|     * X.509v3 (SSL, S/MIME, ...)
|
[...]
|   Please direct your questions concerning this project via e-mail to
|   [EMAIL PROTECTED]
[...]
|   The project DFN-PCA ist funded by the the German National Research adn
|   Education Network (NREN) "Verein zur FÃrderung eines Deutschen
|   Forschungsnetzes e.V." - [35]DFN-Verein (Society for the Development
|   of a German research network).
[...]

Links to the Certificates and Certificate revokation lists (Babelfished German,
substitute "run out" with "expired"):
http://babelfish.altavista.com/babelfish/tr?url=http%3A%2F%2Fwww.dfn-pca.de%2Fcertification%2Fcacert.html&lp=de_en
http://babelfish.altavista.com/babelfish/tr?url=http%3A%2F%2Fwww.dfn-pca.de%2Fcertification%2Fcrls.html&lp=de_en


Some german universities also have CAs certified by this nationwide CA,
at least mine does and it would be nice if these were also to be included:
https://www.ca.uni-hannover.de/
https://www.ca.uni-hannover.de/certs.html

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-ac8-nfsacl
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages ca-certificates depends on:
ii  debconf                       1.4.41     Debian configuration management sy
ii  openssl                       0.9.7e-3   Secure Socket Layer (SSL) binary a

-- debconf information:
* ca-certificates/enable_crts: brasil.gov.br/brasil.gov.br.crt, 
mozilla/ABAecom_=sub.__Am._Bankers_Assn.=_Root_CA.crt, 
mozilla/AddTrust_External_Root.crt, 
mozilla/AddTrust_Low-Value_Services_Root.crt, 
mozilla/AddTrust_Public_Services_Root.crt, 
mozilla/AddTrust_Qualified_Certificates_Root.crt, 
mozilla/America_Online_Root_Certification_Authority_1.crt, 
mozilla/America_Online_Root_Certification_Authority_2.crt, 
mozilla/AOL_Time_Warner_Root_Certification_Authority_1.crt, 
mozilla/AOL_Time_Warner_Root_Certification_Authority_2.crt, 
mozilla/Baltimore_CyberTrust_Root.crt, 
mozilla/beTRUSTed_Root_CA-Baltimore_Implementation.crt, 
mozilla/beTRUSTed_Root_CA.crt, 
mozilla/beTRUSTed_Root_CA_-_Entrust_Implementation.crt, 
mozilla/beTRUSTed_Root_CA_-_RSA_Implementation.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_1.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_2.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_3.crt, 
mozilla/Digital_Signature_Trust_Co._Global_CA_4.crt, 
mozilla/Entrust.net_Global_Secure_Personal_CA.crt, 
mozilla/Entrust.net_Global_Secure_Server_CA.crt, 
mozilla/Entrust.net_Premium_2048_Secure_Server_CA.crt, 
mozilla/Entrust.net_Secure_Personal_CA.crt, 
mozilla/Entrust.net_Secure_Server_CA.crt, mozilla/Equifax_Secure_CA.crt, 
mozilla/Equifax_Secure_eBusiness_CA_1.crt, 
mozilla/Equifax_Secure_eBusiness_CA_2.crt, 
mozilla/Equifax_Secure_Global_eBusiness_CA.crt, mozilla/GeoTrust_Global_CA.crt, 
mozilla/GlobalSign_Root_CA.crt, mozilla/GTE_CyberTrust_Global_Root.crt, 
mozilla/GTE_CyberTrust_Root_CA.crt, mozilla/RSA_Root_Certificate_1.crt, 
mozilla/RSA_Security_1024_v3.crt, mozilla/RSA_Security_2048_v3.crt, 
mozilla/TC_TrustCenter__Germany__Class_2_CA.crt, 
mozilla/TC_TrustCenter__Germany__Class_3_CA.crt, 
mozilla/Thawte_Personal_Basic_CA.crt, mozilla/Thawte_Personal_Freemail_CA.crt, 
mozilla/Thawte_Personal_Premium_CA.crt, mozilla/Thawte_Premium_Server_CA.crt, 
mozilla/Thawte_Server_CA.crt, mozilla/Thawte_Time_Stamping_CA.crt, 
mozilla/UTN-USER_First-Network_Applications.crt, 
mozilla/ValiCert_Class_1_VA.crt, mozilla/ValiC
_Class_2_VA.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_1_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_1_Public_Primary_OCSP_Responder.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_2_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_2_Public_Primary_OCSP_Responder.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_Class_3_Public_Primary_OCSP_Responder.crt, 
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G2.crt, 
mozilla/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.crt, 
mozilla/Verisign_RSA_Secure_Server_CA.crt, 
mozilla/Verisign_Secure_Server_OCSP_Responder.crt, 
mozilla/Verisign_Time_Stamping_Authority_CA.crt, 
mozilla/Visa_eCommerce_Root.crt, mozilla/Visa_International_Global_Root_2.crt, 
quovadis.bm/QuoVadis_Root_Certification_Authority.crt, 
signet.pl/signet_ca1_pem.crt, signet.pl/signet_ca2_pem.crt, 
signet.pl/signet_ca3_pem.crt, signet.pl/signet_ocspklasa2_pem.crt, 
signet.pl/signet_ocspklasa3_pem.crt, signet.pl/signet_pca2_pem.crt, 
signet.pl/signet_pca3_pem.crt, signet.pl/signet_rootca_pem.crt, 
signet.pl/signet_tsa1_pem.crt, spi-inc.org/spi-ca.crt
  ca-certificates/new_crts:
* ca-certificates/trust_new_crts: yes

Reply via email to