Your message dated Sat, 12 Apr 2008 16:02:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#447062: fixed in ca-certificates 20080411
has caused the Debian Bug report #447062,
regarding Upgrade Mozilla certificates to Mozilla CVS trunk versions
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
447062: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447062
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ca-certificates
Version: 20070303

It seems the Mozilla certificates are extracted from certdata.txt from
the mozilla 1.7 branch which is pretty old. I am proposing you switch to
using the mozilla trunk version, which has a lot more certificates.

http://lxr.mozilla.org/seamonkey/source/security/nss/lib/ckfw/builtins/certdata.txt?raw=1

Latest changes in certdata.txt:

1.7 branch: 2005/03/14 23:16:20
trunk:      2007/07/13 06:49:00

-- 
  Heikki Toivonen



--- End Message ---
--- Begin Message ---
Source: ca-certificates
Source-Version: 20080411

We believe that the bug you reported is fixed in the latest version of
ca-certificates, which is due to be installed in the Debian FTP archive:

ca-certificates_20080411.dsc
  to pool/main/c/ca-certificates/ca-certificates_20080411.dsc
ca-certificates_20080411.tar.gz
  to pool/main/c/ca-certificates/ca-certificates_20080411.tar.gz
ca-certificates_20080411_all.deb
  to pool/main/c/ca-certificates/ca-certificates_20080411_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philipp Kern <[EMAIL PROTECTED]> (supplier of updated ca-certificates package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 12 Apr 2008 17:35:26 +0200
Source: ca-certificates
Binary: ca-certificates
Architecture: source all
Version: 20080411
Distribution: unstable
Urgency: low
Maintainer: Fumitoshi UKAI <[EMAIL PROTECTED]>
Changed-By: Philipp Kern <[EMAIL PROTECTED]>
Description: 
 ca-certificates - Common CA certificates
Closes: 377314 434856 447062 456581
Changes: 
 ca-certificates (20080411) unstable; urgency=low
 .
   * Added the current SPI CA certificate, used by Debian's infrastructure.
   * Added Deutsche Telekom Root CA 2, which is used by German institutions
     through the DFN PKI.
   * Updated mozilla certificates from trunk, which led to the following
     adds (+) and removes (-):
     + Camerfirma Chambers of Commerce Root
     + Camerfirma Global Chambersign Root
     + Certplus Class 2 Primary CA
     + COMODO Certification Authority
     + DigiCert Assured ID Root CA
     + DigiCert Global Root CA
     + DigiCert High Assurance EV Root CA
     + DST ACES CA X6
     + DST Root CA X3
     + Entrust Root Certification Authority
     + Firmaprofesional Root CA
     + GeoTrust Global CA 2
     + GeoTrust Primary Certification Authority
     + GeoTrust Universal CA
     + GeoTrust Universal CA 2
     + GlobalSign Root CA - R2
     + Go Daddy Class 2 CA
     + NetLock Business (Class B) Root
     + NetLock Express (Class C) Root
     + NetLock Notary (Class A) Root
     + NetLock Qualified (Class QA) Root
     + QuoVadis Root CA 2
     + QuoVadis Root CA 3
     + Secure Global CA
     + SecureTrust CA
     + Starfield Class 2 CA
     + StartCom Certification Authority
     + StartCom Ltd.
     + Swisscom Root CA 1
     + SwissSign Gold CA - G2
     + SwissSign Platinum CA - G2
     + SwissSign Silver CA - G2
     + Taiwan GRCA
     + thawte Primary Root CA
     + TURKTRUST Certificate Services Provider Root 1
     + TURKTRUST Certificate Services Provider Root 2
     + VeriSign Class 3 Public Primary Certification Authority - G5
     + Wells Fargo Root CA
     + XRamp Global CA Root
     - Verisign Class 1 Public Primary OCSP Responder
     - Verisign Class 2 Public Primary OCSP Responder
     - Verisign Class 3 Public Primary OCSP Responder
     - Verisign Secure Server OCSP Responder
     (Closes: #447062, #456581)
   * Updated the Russian debconf translation, thanks to Mikhail Gusarov.
     (Closes: #434856)
   * Reworded the description and made it static to ease translations.
   * Reworded and amended README.Debian.
   * Added myself to the uploaders of this package.
   * Applied a patch by Martin F. Krafft to support hooks scripts
     on add/remove of a certificate.  (Closes: #377314)
Checksums-Sha1: 
 d51d3b8ac4ee209de91ff643ce56bc10761cc1cb 826 ca-certificates_20080411.dsc
 feb3d01aeb752037abf28ee0bb492c828b6eef19 219046 ca-certificates_20080411.tar.gz
 908cc8af11f02f8115a45daec7bc07a4cf457b0f 148830 
ca-certificates_20080411_all.deb
Checksums-Sha256: 
 65339f2cf3319f762553bf6eccf12e8fd1b6ac595d5e6c8d9ae5b5208a0a2558 826 
ca-certificates_20080411.dsc
 f7317958deaeec251e220c7d385f19acc7e4880fcb1267c5d20a9b2ee210a950 219046 
ca-certificates_20080411.tar.gz
 c2f16f64b37b8319b1f55a358ba69a755649a36443b018e6b5fc6250f11083cb 148830 
ca-certificates_20080411_all.deb
Files: 
 a7117fa6add904fc021b9154bba67c88 826 misc optional ca-certificates_20080411.dsc
 05b90a390249dee8c9bf00c3eb258cc7 219046 misc optional 
ca-certificates_20080411.tar.gz
 612ffe04ec2589d8f43ef806a165b439 148830 misc optional 
ca-certificates_20080411_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIANiO7Ro5M7LPzdgRAnKmAJ9gGDqdS5zLkA6iEDnD0bka7WCNMQCgs7LX
tH2xVAE3+5X6F/OxWXTH5+Q=
=JkhK
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to