Category Archives: Progress

Link

As of now, prospective Assurers can also take the Assurer test CATS in Czech. This is an important step towards vulgarizing of the Web of Trust and CAcert’s efforts to increase security on the Internet.

CAcert offers free certificates that can be used for digital signatures, phishing prophylaxis, login or encryption. In order for their own name to be included in the certificate, each user must first meet and identify themselves with at least two Assurers of the Web of Trust. CATS is an important part of Assurer training, explains Bernhard Fröhlich, responsible for training courses. Experience shows that acceptance and the success rate are higher if a course can be completed in one’s own language. Currently CATS can be completed in Czech, German and English.

www.cacert.org
wiki.cacert.org/AssurerChallenge/

CAcert renewed root certificates

CAcert has finally upgraded the Root and Class 3 certificates from the old MD5 encoding to the modern SHA-256. Your browsers will like us again! The new certificates were installed in “the usual places” on April 10th. You may go to our web site home page, https://www.cacert.org, and over on the right-hand side, three lines from the top, is “Root Certificates.” The short way to get there is https://www.cacert.org/index.php?id=3.

We would like to thank all software team members for the job they did. All teams consist of volunteers. If you want to support the work done by the Software Team, including the review, please donate to continue to run this service. Thank you.

CAcert erneuert Stammzertifikate

CAcert hat endlich die Stamm- und Class 3-Zertifikate von der alten MD5-Kodierung auf die moderne SHA-256 aktualisiert. Ihre Browser werden uns wieder mögen! Die neuen Zertifikate wurden am 10. April an “den üblichen Orten” installiert. Sie können auf unsere Homepage https://www.cacert.org gehen, und auf der rechten Seite, drei Zeilen von oben, finden Sie “Root Certificates”. Der kurze Weg dorthin ist https://www.cacert.org/index.php?id=3.v

Wir möchten uns bei allen Mitgliedern des Softwareteams für die geleistete Arbeit bedanken. Alle Teams bestehen aus Freiwilligen. Wenn Sie die Arbeit des Software-Teams, einschließlich der Überprüfung, unterstützen möchten, spenden Sie bitte, um diesen Service weiter zu betreiben. Danke.

CAcert a renouvelé ses certificats racine

CAcert a finalement mis à jour les certificats Root et Class 3 de l’ancien encodage MD5 vers le moderne SHA-256. Vos navigateurs nous apprécieront à nouveau ! Les nouveaux certificats ont été installés dans “les lieux habituels” le 10 avril. Vous pouvez vous rendre sur la page d’accueil de notre site Web, https://www.cacert.org, et sur le côté droit, à trois lignes du haut, se trouve “Root Certificates”. Le chemin le plus court pour s’y rendre est https://www.cacert.org/index.php?id=3.v

Nous aimerions remercier tous les membres de l’équipe du logiciel pour le travail qu’ils ont fait. Toutes les équipes sont composées de bénévoles. Si vous souhaitez soutenir le travail effectué par l’équipe du logiciel, y compris la révision, veuillez faire un don pour continuer à faire fonctionner ce service. Merci.

Passez bientôt le test des accréditeurs en français

Français ¦ Deutsch ¦ English

CAcert ParisCAcert va de l’avant! Vous avez au moins 100 points de confiance et vous auriez aimé devenir un accréditeur depuis longtemps? Malheureusement, votre anglais n’est pas si bon que ça, vous aimeriez passer le test d’accréditeur (CATS) en français? Réjouissez-vous avec nous: des volontaires de Belgique, de Suisse et de France ont localisé le système de test et il est maintenant disponible en français.

Maintenant, ils travaillent d’arrache-pied pour traduire également les questions du test. Nous sommes confiants que le CATS francophone sera disponible au début de 2019 ou au printemps. Motivez nos bénévoles avec un don généreux pour couvrir les frais de fonctionnement des serveurs.

Possibilités
Virement bancaire en Euro:
secure-u e.V. Banque: Hamburger Volksbank e.G. / IBAN: DE50 2019 0003 0003 0008 5478 07 BIC: GENODEF1HH2 (“pour CAcert”) (l’association secure-u est notre partenaire local en Union Européenne)
Virement bancaire en Australie en AU$:
Compte bancaire Westpac pour AU$: Nom du compte : CAcert Inc. / SWIFT : WPACAU2S /      N° de compte : 180264
Paypal:
Soutenez CAcert avec 50$ maintenant avec Paypal
ou faites un don Paypal unique du montant que vous désirez pour nous aider.

DEUTSCH: CAcert-Assurer-Test (CATS) bald auf Französisch

Bei CAcert geht es vorwärts! Während wir Deutschsprachigen den CATS schon seit Jahren auf Deutsch ablegen können, stehen unsere westlichen Nachbarn immer noch vor einer hohen Sprachbarriere. Sie haben mindestens 100 Vertrauenspunkte und wären schon lange gerne Assurer geworden. Leider sind Ihre Englischkenntnisse nicht so gut; sie möchten die Assurer-Prüfung gerne in der Sprache Molières ablegen. Das wird schon bald möglich sein: Freiwillige aus Belgien, der Schweiz und Frankreich haben das Testsystem lokalisiert und es steht ab sofort auch auf Französisch zur Verfügung.

Nun arbeiten sie mit Hochdruck daran, auch die Testfragen zu übersetzen. Wir sind zuversichtlich, dass die französischsprachige Assurer-Prüfung Anfangs 2019 oder im Frühling zur Verfügung steht. Motivieren Sie unsere Freiwilligen mit einer grosszügigen Spende zur Deckung der Betriebskosten der Server.

ENGLISH: CAcert-Assurer-Test (CATS) will be available also in French

CAcert at ParisCAcert is moving forward! We have a lot of members in Belgium, France and Western Switzerland. They have at least 100 assurance points and would have liked to become an Assurer a long time ago. Unfortunately, their English is not so good; they would like to take the Assurer exam in Molière’s language. There are good news: volunteers from Belgium, Switzerland and France have localised the test system and it is now available in French.

Now they are working hard to translate the test questions as well. We are confident that the French CATS will be available in early 2019 or spring. Motivate our volunteers with a generous donation to cover the running costs of the servers.

 

CAcert 2017

February brought the start of the exhibition season for CAcert with our presence at FOSDEM – one of the biggest Europe-wide developer conferences in Brussels, Belgium. Of course we performed our well-known assurances, which is very popular at such events, with which CAcert safeguards its certificates by checking users’ ID documents. This allows us to offer a safe and trustworthy certificate authority to our users. Of particular note was that interested people were seeking more detailed information about security – questions such as what it actually means, and why are we not yet in the trust stores of many of the web browsers. It’s true that Let’s encrypt is trusted by the popular browsers, but if you take a close look at the certificate of a site protected with a Let’s encrypt certificate, you will find out that it does not contain any information about the owner. This means it is impossible to verify the identity of the site and therefore it is basically uncertain to which site the browser is actually connected to. CAcert allows the site owner to publish identification information in the certificate after the assurance – for private users as well as for companies. This way, CAcert offers a clear mutual trust, which makes it worth importing the CAcert-Root-certificate from www.cacert.org.

But there’s more: CAcert offers client certificates as well and signs GPG/PGP keys. Anyone who always wanted to sign his emails and encrypt them if needed, can do this easily with CAcert. Most email clients supports S/MIME certificates or PGP. By this means the authenticity of the sender is verified, and the receipient can verify the name of the certificate owner. Also attachments like PDF can be signed this way and protect the document against later changes.

CAcert is supported by an Australian non-profit association, the operation of the server is safeguarded by the German incorporated society secure-u. This structure has advantages, but the Australian society is possible only as long as CAcert has at least three Australian residents as members of the board. In 2017 we want to bring the association behind the web of trust to Europe. This limits the resources of many of the active members, because the handover must be done under appropriate rules. Anyone who wants to support CAcert can find more details at recent blog post “Prosit 2017” or can send an e-mail to support@cacert.org

For a secure 2017!
Your CAcert

Successful process tests of New Root and Escrow and Class 1 Root resigning

On Sunday at FrOSCon 10 CAcert successfully tested the New Root and Escrow (NRE) process and performed a test run of the long expected Class 1 Resigning.

Members of the software team, the critical admins, the NRE team, and the internal auditor met in a session, which was open to the public, to test these long prepared tasks.

The process started with checking that the needed hardware was running and was setup up according to the process definition. In a first step the defined tasks were then executed manually to proof that the procedures produces the desired results. In a second step the manual tasks were automated where possible and the script was tested and checked according to the process definition.

The results show the expected outcome.

The internal auditor was pleased with the good and professional preparation of the test and the successful outcome. The new root keys created during the NRE test will be used for a test server based on Gigi and Cassiopeia.

Related Information:

Availability of CAcert Root Certificates on Linux Distributions

After the inclusion of CAcert in Debian has been a quite complicated story for the past few years we are glad to announce that there’s a new package in the Debian Sid (unstable) branch: ca-cacert. This package has been created and will be maintained by Dmitry Smirnov. This package became necessary after Debian decided to remove CAcert from its main certificate store provided by the package ca-certificates in early 2014 [1].

Our goal is to promote awareness and education on computer security through the use of encryption, specifically by providing cryptographic certificates. These certificates can be used to digitally sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the internet. Any application that supports the Transport Layer Security (TLS) or the somewhat older Secure Socket Layer Protocol (SSL) can make use of certificates signed by CAcert, as can any application that uses X.509 certificates, e.g. for encryption or code signing and document signatures.

The re-inclusion – even if just as a supplementary package – allows users of Debian and its many derivatives to securely access and install our certificates. Using this path for installation of our root certificates a major attack vector during installation has been mitigated by providing an additional, verified means to get an authenticated copy of our root certificates. Another possibility to verify our certificates after download has been prepared recently and will be documented soon.

CAcert is still pursuing to become audited and thus available in the default browser and OS trust stores.

We thank all people who were involved in creating and providing this package and hope for a constructive future development. Furthermore we like to thank the maintainers of the openSUSE package who made sure our root certificates have been available for the past years [2]. Also we want to thank all other package maintainers for other OS helping to provide a safe anchor for our certificates[3].

Currently our Wiki editors are working on HowTo documents [4, 5].

[1] https://packages.qa.debian.org/c/ca-cacert.html
[2] https://software.opensuse.org/package/ca-certificates-cacert
[3] https://wiki.cacert.org/InclusionStatus
[4] https://wiki.cacert.org/HowToDocuments/
[5] https://wiki.cacert.org/HowToDocuments/DE