-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The SHA-1 fingerprint of the SwUPKI root certificate is likely to be: 4D:41:99:C3:B4:CA:BF:33:ED:4B:D0:5C:6C:48:60:51:58:08:93:D8 I have checked the following sources, and they all agree. Be aware that the sources are all weak, since none of them use SSL, PGP or any other cryptographic protection, so I may be a victim of an elaborate attack. Sources checked (and when I checked them): http://ca.liu.se/anv/ 2006-01-26 10:46 GMT http://www.swupki.se/ 2006-01-26 10:47 GMT http://www.swupki-pca.umu.se/CA/pcacert.crt 2006-01-26 10:48 GMT http://www.swupki-pca.umu.se/CA/pcacert.der 2006-01-26 10:50 GMT I have also installed the certificate and verified that the following pages work properly once the root certificate above is installed: https://webmail.liu.se/ 2006-01-26 11:01 GMT https://ceres.unit.liu.se/ 2006-01-26 11:01 GMT https://lists.lysator.liu.se/ 2006-01-26 11:01 GMT I plan to re-check the above sources, and any new sources I can find in the future, and update this file accordingly. /ceder -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFD2K1ITl5zjNKUYI4RAnxVAKCLnGmCOyCPz4uAiEXg8dWNcOMLswCfbesM s8gmCo/PAlG1nBbzZ2p7IEw= =o89Y -----END PGP SIGNATURE-----