Before the blacklists were in place we had revoked the certificates and were able to monitor OCSP traffic for them both before and after the blacklists were in place. I used this تیک بان خرید اینترنتی بلیط هواپیما را ارزان و راحت می کند.https://tikban.com/
-- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ca-certificates in Ubuntu. https://bugs.launchpad.net/bugs/310999 Title: comodo seen issuing certificates unwisely Status in NSS: Fix Released Status in ca-certificates package in Ubuntu: Invalid Status in nss package in Ubuntu: Won't Fix Status in ca-certificates source package in Dapper: Invalid Status in nss source package in Dapper: Won't Fix Status in ca-certificates source package in Gutsy: Invalid Status in nss source package in Gutsy: Won't Fix Status in ca-certificates source package in Hardy: Invalid Status in nss source package in Hardy: Won't Fix Status in ca-certificates source package in Intrepid: Invalid Status in nss source package in Intrepid: Won't Fix Status in ca-certificates source package in Jaunty: Invalid Status in nss source package in Jaunty: Won't Fix Bug description: http://blog.startcom.org/?p=145 Comodo, or one of its resellers, has been observed selling certificates without serious domain control checks or other verification. There should be some consideration for removing the impacted CA certificate from ca-certificates and other related packages in the near future, considering the possibility of other fake certificates. I wish the site above had more details, but obviously a 'how to get your own cert like this' is just asking for trouble. To manage notifications about this bug go to: https://bugs.launchpad.net/nss/+bug/310999/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp

