A new default rule has been added to Practice On Names – Hyphen Rule.
For the purposes of checking the Name against PoN, a hyphen in given names is to be treated as optional.
Continue reading
A new default rule has been added to Practice On Names – Hyphen Rule.
For the purposes of checking the Name against PoN, a hyphen in given names is to be treated as optional.
Continue reading
To all community member and assurer,
The arbitration and support teams developed a new “Name Change after
Marriage w/ Assurance” procedure though an arbitration case a20110330.1.
The procedure is outlined in
http://wiki.cacert.org/Arbitrations/Training/Lesson12 and
http://wiki.cacert.org/Support/Handbook/PrecedentCases/a20110330.1.
This should speed up the process of a name change after marriage.
All you need to do is (for the user who wants to get a name change after
marriage):
1. Find at least 2 Assurer to do an Assurance
2. Send a list of the assurers that can confirm the name change after
marriage to support
That’s it.
Support than will contact the parties to get further information.
Benl writes: Improving SSL certificate security
Friday, April 1, 2011 9:05 AM Posted by Ben Laurie, Google Security Team
In the wake of the recent [incident], there has been a great deal of speculation about how to improve the public key infrastructure, on which the security of the Internet rests. Unfortunately, this isn’t a problem that will be fixed overnight. Luckily, however, [engineers] have long known about these issues and have been devising solutions for some time.
Given the current interest it seems like a good time to talk about two projects in which Google is engaged.
The first is the Google Certificate Catalog. Google’s web crawlers scan the web on a regular basis in order to provide our search and other services. In the process, we also keep a record of all the SSL certificates we see. The Google Certificate Catalog is a database of all of those certificates, published in DNS. So, for example, if you wanted to see what we think of https://www.google.com/’s certificate, you could do this:
[tech details snipped]
The second initiative to discuss is the DANE Working Group at the IETF. DANE stands for DNS-based Authentication of Named Entities. In short, the idea is to allow domain operators to publish information about SSL certificates used on their hosts. It should be possible, using DANE DNS records, to specify particular certificates which are valid, or CAs that are allowed to sign certificates for those hosts. So, once more, if a certificate is seen that isn’t consistent with the DANE records, it should be treated with suspicion. Related to the DANE effort is the individually contributed CAA record, which predates the DANE WG and provides similar functionality.
[caveats snipped]
Improving the public key infrastructure of the web is a big task and one that’s going to require the cooperation of many parties to be widely effective. We hope these projects will help point us in the right direction.
If you tried to log in to CATS recently with a newly created certificate you probably failed. Especially when using a Class 3 certificate. Now I hope this bug is finally fixed.
Like usual for such bugs it was quite a trivial thing, for details compare CAcert/Education/CATS/login.php in svn with its previous version.
For analysis: certificates affected contained a serial number wich started with a non-digit character after stripping learing zeros. So Class 3 certificates with serial number bigger than 09:ff (issued since about half a year ago) and Class 1 certificates with serial greater than 09:ff:ff (issued since recently) have been affected.
I’m still waiting for the first explicit confirmation of someone now able to log in, but the analysis nicely fits the symtoms and the problem could be reproduced on the test system, so I hope we finally got it.
Within the last 2 days, the testserver got the running signer integration into the testserver environment. This was one of the milestones in getting a testing environment as identical as possible to the production system.
Continue reading
This year too, there will be enough 35-point assurers at the booth of the LUG Ottobrunn at Linux Infotag in Augsburg (26th march) to get fully assured (100 points). Check for the CAcert badges & logo !
Auch dieses Jahr werden ausreichend 35-Punkte Assurer am Stand der LUG Ottobrunn beim Linux Infotag in Augsburg (26. März) anwesend sein, um voll assured zu werden (100 Punkte). Folgt dem CAcert Logo !
After Munich’s ATE in 2009 another one is scheduled. This time it is a joint offer from the CAcert community and Munich’s open source meetings. It is also supported by secure-u e.V.
We will host the ATE on afternoon of 2nd April. More details on the wiki.
There are a couple of options to indicate that you are attending:
– Email I will attend ATE-Munich
– Acknowledge the XING event
– Edit the wiki directly
As IanG said: “The ATE or Assurer Training Event is exceptionally recommended for all Assurers, and include parts which contribute directly to our audit. Come and find out how you can also contribute.”
~ 30 people have been registered already. Looking forward to seeing you at the ATE.
… CAcert4München.
Hmmm, not really, to be honest 😉
It is true that it has been awarded. But it didn’t won the Oscar, not even the „Goldene Kamera“.
CAcert4München was amongst the awarded proposals for the Munich Open Government Day (MOGDy) .
And the award can be viewed at the bottom of this page.
What is the proposal about ?
Well, in a nutshell it suggests that the Munich Government uses CAcert for client and server certificates needed. And they might include CAcert’s root certificates into their own Linux distribution called LiMux.
Note that one can vote for the proposal still. The more people support the proposal the more important it looks to the people running the MOGDy campaign.
How to support ?
Register: Go to the registration page , upper righ hand corner ? Registrieren.
Then on the right hand side fill in:
Benutzername: user name, your choice
E-Mail: your email address
Passwort: choose your own password
Passwort (bestätigen): enter your password a second time
Vote: Go to the proposal page and on the upper left hand side either click on
dafür (aye) or
dagegen (naye)
Of course MOGDy is targeted (but not restricted) to people living in Munich.
So please support the proposal, since it is an advantage for Munich (save costs, create yet more attractiveness in the open source community) and for CAcert (probably one „big shot“ for the inclusion status).
Thanks
Frank
We had received a couple of reports by either irc, emails to support or on mailing lists, that the Russian Translation of our CAcert.org Website has garbled Russian translations. This has been reported as Bug #900.
After several analyzes, tests, discussions, we came to the conclusion, that we need an overall UTF-8 upgrade of the critical system. This has to be started as an individual project. As this project doesn’t effects our great efforts on Audit, the priority is lowered against several other Audit essential projects. So currently, there is no easy and no quick fix possible. So we, or better to say Michael V. A. (one of the bug reporters) worked out an workaround:
the exact steps to reproduce both the problem and the workaround:
1. The Bug
http://CAcert.org [^] / Translations / ???????
( http://www.cacert.org/index.php?id=0&lang=ru_RU )
Now the text is garbled (“Western ISO-8859-1” autodetected).
2. The Workaround
Switching to ISO-8859-5.
In my browser (Firefox 3.6.13) it’s exactly the following:
View / Character Encoding / More Encodings
/ East European / Cyrillic (ISO-8859-5)
Now all Russian text is okay.
The workaround works for me.
Yes, I think this should work for other users, as well.
CAcert and sidux e.V. will be present at Fosdem 2011, the Free and Open Source Software Developers’ European Meeting, February Sat 5th and Sun 6th 2011
If you want to help on our booth, register yourself on our events wiki page Fosdem 2011 planning
CU at Fosdem ….