In order to avoid browser warnings for the Savannah users, we'll generate new certificates using a new CA. Generation procedure can be found at ~/Beuc/CA.sh
We also started a discussion with RMS about using CAcert.org (they offer the source code to their web system). We still need answers to the 2 questions below :) -- Sylvain On Fri, Jan 13, 2006 at 12:37:15AM +0100, Sylvain Beucler wrote: > Hi, > > Savannah's TLS certificates for savannah.gnu.org and > savannah.nongnu.org expired today (oops). > > Currently, we are using certificates signed by a pseudo CA generated > by James E. Blair, which is valid for the next 18 years. > > > I'm interesting in using CAcert.org certificates. This involves mail > verification to an adress like 'root' or 'postmaster' > @savannah.[non]gnu.org. Alas, there's no MX for Savannah, so we'd need > to fix that. Does that sound feasible to you? > > > The other solution is to continue using Jim's CA, but we do not have > the RSA key password. Do you happen to have it in your documentation?
