-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The SHA-1 fingerprint of the SwUPKI root certificate is likely to be: 4D:41:99:C3:B4:CA:BF:33:ED:4B:D0:5C:6C:48:60:51:58:08:93:D8 I have checked the following sources, and they all agree. Be aware that the sources are all weak, since none of them use SSL, PGP or any other cryptographic protection, so I may be a victim of an elaborate attack. Sources checked (and when I checked them): http://ca.liu.se/anv/ 2006-01-26 10:46 GMT http://www.swupki.se/ 2006-01-26 10:47 GMT http://www.swupki-pca.umu.se/CA/pcacert.crt 2006-01-26 10:48 GMT http://www.swupki-pca.umu.se/CA/pcacert.der 2006-01-26 10:50 GMT I have also installed the certificate and verified that the following pages work properly once the root certificate above is installed: https://webmail.liu.se/ 2006-01-26 11:01 GMT https://ceres.unit.liu.se/ 2006-01-26 11:01 GMT https://lists.lysator.liu.se/ 2006-01-26 11:01 GMT On 2006-01-26 11:47 GMT, somebody claiming to be kent@unit.liu.se, stated that the fingerprint in this file matches the root certificate he has imported in his web browser. This was however done over an insecure text-only channel. I plan to re-check the above sources, and any new sources I can find in the future, and update this file accordingly. /ceder -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFD2MTJTl5zjNKUYI4RAiFjAJwNTXplzDrH5YGLPD0CaUYuvVwTwQCfR/+r bCmniGS/+Tin9BHFI6mH8UI= =de23 -----END PGP SIGNATURE-----