Package: www.debian.org
Severity: normal

*** Please type your report below this line ***
12.1.3:
Part: "for example, the Common Criteria."
Link: http://niap.nist.gov/cc-scheme/st/

12.3.15:
1)
Part: "Security Contact key (key ID 0x363CCD95)."
Link: 
http://pgpkeys.pca.dfn.de:11371/pks/lookup?search=0x363CCD95%5C%7C[amp%20]%5C%7Cop=vindex
2)
Part: "See also the PGP/GPG keys for the security team."
Link: http://www.debian.org/security/keys.txt

12.3.23:
Part: "(available at http://ftp-master.debian.org/ziyi_key_2006.asc, substitute 
2006 for the current year"
Link: http://ftp-master.debian.org/ziyi_key_2006.asc

Also: http://www.debian.org/security/faq
Broken link: http://pgpkeys.pca.dfn.de/pks/lookup?search=0x68B64E0D&op=vindex

-- System Information:
Debian Release: 6.0.2
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110804101217.ga25...@foo.fgeek.fi

Reply via email to