/[www]/www/bkuhn-signed-agia-certificate.txt
ViewVC logotype

Contents of /www/bkuhn-signed-agia-certificate.txt

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.1 - (show annotations) (download)
Fri Feb 1 16:47:49 2002 UTC (22 years, 7 months ago) by rao
Branch: MAIN
CVS Tags: HEAD
File MIME type: text/plain
Copy of agia's self-cert info.

1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 bkuhn's GPG Signature of agia.fsf.org's SSL Certificate
5 =======================================================
6
7 Below is the temporary certificate information for the FSF's online
8 ordering system. I, Bradley M. Kuhn, Vice President of the Free Software
9 Foundation, hereby certify that I personally verified this information
10 with the following command:
11
12 /usr/bin/openssl x509 -md5 -fingerprint -in apache.pem
13
14 I ran that command using a keyboard and monitor directly attached to the
15 physical machine, agia.fsf.org. All equipment (machine, keyboard,
16 monitor, cables) were visible to me while I ran the command.
17
18 How To Check My Signature
19 =========================
20
21 If you are a GPG user, you can check the GPG signature of this message; it
22 is signed with my GNU Privacy Guard key. To do this, first get a copy of
23 my public key, which you can do (when you are connected to the Internet)
24 with the following command:
25
26 gpg --keyserver gpg.dtype.org --recv-key DB41B387
27
28 After that command runs successful, you can save this file and run the
29 following command to verify its signature:
30
31 gpg bkuhn-signed-agia-certificate.txt
32
33 (or replace bkuhn-signed-agia-certificate.txt with a filename you chose to
34 save this in).
35
36
37 Verifying This Temporary Certificate Information
38 ================================================
39
40 The certificate information is below. Information may be presented
41 differently in different browsers.
42
43 You can also get the information from the command line on Debian GNU/Linux
44 system (with openssl package installed) with the following command:
45
46 echo -e \004 | openssl s_client -connect agia.fsf.org:443 2>&1 | \
47 openssl x509 -md5 -fingerprint
48
49 and comparing its output with what is below.
50
51
52 Why This Information Is Temporary
53 =================================
54
55 We currently have an order in with a signing authority, Thawte, to have a
56 signed key from them. That will provide the means for your browser to
57 verify this information directly. I will also post a GPG-signed message
58 like this one for the new certificate as well.
59
60
61 ###############################################################################
62 Issued To:
63
64 Common Name (CN) agia.fsf.org
65 Organization (O) Free Software Foundation
66 Organizational Unit (OU) Ordering
67 Serial Number 00
68
69 Issued By:
70
71 Common Name (CN) agia.fsf.org
72 Organization (O) Free Software Foundation
73 Organizational Unit (OU) Ordering
74 City (L) Boston
75 State (ST) Massachusetts
76 Country (C) USA
77 Email order@fsf.org
78
79 Validity
80
81 Issued On 12/10/01
82 Expires On 12/10/02
83
84
85 Fingerprints
86
87 SHA1 Fingerprint 33:E1:B3:55:83:30:5E:DC:09:B4:3A:4E:3D:17:5A:F8:72:1E:9D:8B
88 MD5 Fingerprint 0E:50:0C:29:CB:3A:B7:41:96:8B:7B:5D:7C:71:F7:84
89
90 - -----BEGIN CERTIFICATE-----
91 MIIDvTCCAyagAwIBAgIBADANBgkqhkiG9w0BAQQFADCBoTELMAkGA1UEBhMCVVMx
92 FjAUBgNVBAgTDU1hc3NhY2h1c2V0dHMxDzANBgNVBAcTBkJvc3RvbjEhMB8GA1UE
93 ChMYRnJlZSBTb2Z0d2FyZSBGb3VuZGF0aW9uMREwDwYDVQQLEwhPcmRlcmluZzEV
94 MBMGA1UEAxMMYWdpYS5mc2Yub3JnMRwwGgYJKoZIhvcNAQkBFg1vcmRlckBmc2Yu
95 b3JnMB4XDTAxMTIxMDE2MzMxN1oXDTAyMTIxMDE2MzMxN1owgaExCzAJBgNVBAYT
96 AlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMQ8wDQYDVQQHEwZCb3N0b24xITAf
97 BgNVBAoTGEZyZWUgU29mdHdhcmUgRm91bmRhdGlvbjERMA8GA1UECxMIT3JkZXJp
98 bmcxFTATBgNVBAMTDGFnaWEuZnNmLm9yZzEcMBoGCSqGSIb3DQEJARYNb3JkZXJA
99 ZnNmLm9yZzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAvewLeMfsyR/H5br6
100 ZR3xXFc9IxpUVUN9UCcUhIA5cqJDs8zrKgtUehhsPV5D6mfwGJIlHojMq9LWHS61
101 3Kr6KwLp9QqA65pNpvlSJtAVQBQdrYs0OAXR6bmr6Z4y7k4ncMDnvdmKTPzvEwwg
102 UoAh0FwksSpTFtb3I8eP1vfimw0CAwEAAaOCAQEwgf4wHQYDVR0OBBYEFIFzBvvm
103 xEXG5nRry78LcP0QMrV1MIHOBgNVHSMEgcYwgcOAFIFzBvvmxEXG5nRry78LcP0Q
104 MrV1oYGnpIGkMIGhMQswCQYDVQQGEwJVUzEWMBQGA1UECBMNTWFzc2FjaHVzZXR0
105 czEPMA0GA1UEBxMGQm9zdG9uMSEwHwYDVQQKExhGcmVlIFNvZnR3YXJlIEZvdW5k
106 YXRpb24xETAPBgNVBAsTCE9yZGVyaW5nMRUwEwYDVQQDEwxhZ2lhLmZzZi5vcmcx
107 HDAaBgkqhkiG9w0BCQEWDW9yZGVyQGZzZi5vcmeCAQAwDAYDVR0TBAUwAwEB/zAN
108 BgkqhkiG9w0BAQQFAAOBgQClDo6Mj/dP83njIv/9szObTEyxfaK7g15QphQZz5RK
109 tlPVNEhXJvL8FXGqhP54yhYQJTYt+5v/cpkEIPuqenzmGzVCKxy/w6fppJqhHQqX
110 QLCp62p93qtrOPjDGydFSsG1+N9yNS3rDAP37SvS/0tqtPEo0zvtHc+gcNHv0Dlz
111 5Q==
112 - -----END CERTIFICATE-----
113 -----BEGIN PGP SIGNATURE-----
114 Version: GnuPG v1.0.6 (GNU/Linux)
115 Comment: For info see http://www.gnupg.org
116
117 iD8DBQE8UWFF53XjJNtBs4cRAn63AJ9DZq/T5b2iqRL2QkUjxPxpOAUApACgwIKI
118 BusbA9zKwIN0sbZitFcE4ho=
119 =QOqv
120 -----END PGP SIGNATURE-----

savannah-hackers-public@gnu.org
ViewVC Help
Powered by ViewVC 1.1.26