In order to avoid browser warnings for the Savannah users, we'll
generate new certificates using a new CA.
Generation procedure can be found at ~/Beuc/CA.sh

We also started a discussion with RMS about using CAcert.org (they
offer the source code to their web system).

We still need answers to the 2 questions below :)

-- 
Sylvain

On Fri, Jan 13, 2006 at 12:37:15AM +0100, Sylvain Beucler wrote:
> Hi,
> 
> Savannah's TLS certificates for savannah.gnu.org and
> savannah.nongnu.org expired today (oops).
> 
> Currently, we are using certificates signed by a pseudo CA generated
> by James E. Blair, which is valid for the next 18 years.
> 
> 
> I'm interesting in using CAcert.org certificates. This involves mail
> verification to an adress like 'root' or 'postmaster'
> @savannah.[non]gnu.org. Alas, there's no MX for Savannah, so we'd need
> to fix that. Does that sound feasible to you?
> 
> 
> The other solution is to continue using Jim's CA, but we do not have
> the RSA key password. Do you happen to have it in your documentation?


Reply via email to