Version in base suite: 1.133-1~deb12u1 Base version: igtf-policy-bundle_1.133-1~deb12u1 Target version: igtf-policy-bundle_1.140-1~bpo12+1 Base file: /srv/ftp-master.debian.org/ftp/pool/main/i/igtf-policy-bundle/igtf-policy-bundle_1.133-1~deb12u1.dsc Target file: /srv/ftp-master.debian.org/policy/pool/main/i/igtf-policy-bundle/igtf-policy-bundle_1.140-1~bpo12+1.dsc CHANGES | 79 ++ Makefile.tpl | 263 ++++----- README.txt | 6 debian/.gitlab-ci.yml | 48 + debian/changelog | 104 +++ debian/control | 13 debian/gbp.conf | 5 debian/po/ca.po | 100 +++ debian/po/templates.pot | 6 debian/rules | 20 debian/salsa-ci.yml | 3 debian/upstream/signing-key.asc | 36 + debian/watch | 8 policy-igtf-classic.info | 285 +++++----- policy-igtf-dcvota.info | 6 policy-igtf-discontinued.info | 4 policy-igtf-experimental.info | 10 policy-igtf-iota.info | 13 policy-igtf-mics.info | 30 - policy-igtf-slcs.info | 4 policy-igtf-unaccredited.info | 14 policy-igtf.info | 177 +++--- src/accredited/AC-GRID-FR-Personnels.crl_url | 1 src/accredited/AC-GRID-FR-Personnels.info | 11 src/accredited/AC-GRID-FR-Personnels.pem | 33 - src/accredited/AC-GRID-FR-Personnels.signing_policy | 5 src/accredited/AC-GRID-FR-Robots.crl_url | 1 src/accredited/AC-GRID-FR-Robots.info | 11 src/accredited/AC-GRID-FR-Robots.pem | 33 - src/accredited/AC-GRID-FR-Robots.signing_policy | 5 src/accredited/AC-GRID-FR-Services.crl_url | 1 src/accredited/AC-GRID-FR-Services.info | 11 src/accredited/AC-GRID-FR-Services.pem | 33 - src/accredited/AC-GRID-FR-Services.signing_policy | 5 src/accredited/AC-GRID-FR.crl_url | 1 src/accredited/AC-GRID-FR.info | 11 src/accredited/AC-GRID-FR.namespaces | 28 src/accredited/AC-GRID-FR.pem | 28 src/accredited/AC-GRID-FR.signing_policy | 5 src/accredited/ANSPGrid.crl_url | 1 src/accredited/ANSPGrid.info | 9 src/accredited/ANSPGrid.namespaces | 13 src/accredited/ANSPGrid.pem | 32 - src/accredited/ANSPGrid.signing_policy | 3 src/accredited/ANSPGridCA2.crl_url | 1 src/accredited/ANSPGridCA2.info | 9 src/accredited/ANSPGridCA2.namespaces | 13 src/accredited/ANSPGridCA2.pem | 32 + src/accredited/ANSPGridCA2.signing_policy | 4 src/accredited/ASGCCA-2007.info | 2 src/accredited/ArmeSFo.info | 4 src/accredited/ArmeSFo.pem | 36 - src/accredited/BG-ACAD-CA.info | 2 src/accredited/CERN-GridCA.info | 2 src/accredited/CERN-Root-2.info | 2 src/accredited/CESNET-CA-4.info | 2 src/accredited/CESNET-CA-5.crl_url | 1 src/accredited/CESNET-CA-5.info | 15 src/accredited/CESNET-CA-5.namespaces | 11 src/accredited/CESNET-CA-5.pem | 34 + src/accredited/CESNET-CA-5.signing_policy | 4 src/accredited/CESNET-CA-Root.info | 2 src/accredited/CESNET-CA-Root2.crl_url | 1 src/accredited/CESNET-CA-Root2.info | 14 src/accredited/CESNET-CA-Root2.namespaces | 13 src/accredited/CESNET-CA-Root2.pem | 35 + src/accredited/CESNET-CA-Root2.signing_policy | 5 src/accredited/DCAROOT-G1.info | 2 src/accredited/DFN-GridGermany-Root.info | 2 src/accredited/DZeScience.info | 2 src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.info | 2 src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.info | 2 src/accredited/DigiCertAssuredIDRootCA-Root.info | 2 src/accredited/DigiCertGridCA-1G2-Classic-2015.info | 2 src/accredited/DigiCertGridRootCA-Root.info | 2 src/accredited/DigiCertGridTrustCAG2-Classic.info | 2 src/accredited/EMOVTLSCAG2A1.crl_url | 1 src/accredited/EMOVTLSCAG2A1.info | 16 src/accredited/EMOVTLSCAG2A1.namespaces | 19 src/accredited/EMOVTLSCAG2A1.pem | 39 + src/accredited/EMOVTLSCAG2A1.signing_policy | 4 src/accredited/EMOVTLSCAG2B.crl_url | 1 src/accredited/EMOVTLSCAG2B.info | 16 src/accredited/EMOVTLSCAG2B.namespaces | 19 src/accredited/EMOVTLSCAG2B.pem | 38 + src/accredited/EMOVTLSCAG2B.signing_policy | 4 src/accredited/EMOVTLSCAG2C.crl_url | 1 src/accredited/EMOVTLSCAG2C.info | 16 src/accredited/EMOVTLSCAG2C.namespaces | 19 src/accredited/EMOVTLSCAG2C.pem | 38 + src/accredited/EMOVTLSCAG2C.signing_policy | 4 src/accredited/GEANTTCSAuthenticationECCCA4B.info | 2 src/accredited/GEANTTCSAuthenticationECCCA5.info | 2 src/accredited/GEANTTCSAuthenticationRSACA4B.info | 2 src/accredited/GEANTTCSAuthenticationRSACA5.info | 2 src/accredited/GEANTTCSRETrustECCRootCA5.info | 2 src/accredited/GEANTTCSRETrustRSARootCA5.info | 2 src/accredited/GEANTeSciencePersonalCA4.info | 2 src/accredited/GEANTeSciencePersonalECCCA4.info | 2 src/accredited/GEANTeScienceSSLCA4.info | 2 src/accredited/GEANTeScienceSSLECCCA4.info | 2 src/accredited/GridCanada.info | 2 src/accredited/HARICAGEANTTLSECC1.info | 2 src/accredited/HARICAGEANTTLSRSA1.info | 2 src/accredited/HARICAOVTLSECC.info | 2 src/accredited/HARICAOVTLSRSA.info | 2 src/accredited/HARICATLSECCRootCA2021.info | 2 src/accredited/HARICATLSRSARootCA2021.info | 2 src/accredited/HPCI.crl_url | 1 src/accredited/HPCI.info | 13 src/accredited/HPCI.namespaces | 13 src/accredited/HPCI.pem | 20 src/accredited/HPCI.signing_policy | 33 - src/accredited/HellasGrid-CA-2016.info | 2 src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.info | 2 src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.info | 2 src/accredited/IGCA2.info | 2 src/accredited/IHEP-2013.info | 2 src/accredited/IRAN-GRID-GCG-G2.info | 2 src/accredited/InCommon-RSA-IGTF-Server-CA-3.info | 2 src/accredited/KEK.crl_url | 1 src/accredited/KEK.info | 8 src/accredited/KEK.namespaces | 13 src/accredited/KEK.pem | 21 src/accredited/KEK.signing_policy | 33 - src/accredited/KEK2024.crl_url | 1 src/accredited/KEK2024.info | 10 src/accredited/KEK2024.namespaces | 13 src/accredited/KEK2024.pem | 32 + src/accredited/KEK2024.signing_policy | 4 src/accredited/KISTIv3.info | 2 src/accredited/MREN-CA.info | 2 src/accredited/MaGrid.info | 2 src/accredited/NIKHEF.info | 2 src/accredited/NorduGrid-2015.info | 2 src/accredited/PK-Grid-2007.info | 2 src/accredited/PKIUNAMgrid.info | 2 src/accredited/PolishGrid-2019.info | 2 src/accredited/RCauth-Pilot-ICA-G1.info | 4 src/accredited/RCauth-Pilot-ICA-G1.pem | 28 src/accredited/RDIG.info | 2 src/accredited/REUNA-ICA-C5.crl_url | 1 src/accredited/REUNA-ICA-C5.info | 13 src/accredited/REUNA-ICA-C5.namespaces | 11 src/accredited/REUNA-ICA-C5.pem | 38 + src/accredited/REUNA-ICA-C5.signing_policy | 5 src/accredited/REUNA-ca.info | 2 src/accredited/ResearchandEducationTrustECCRootCA.info | 2 src/accredited/ResearchandEducationTrustRSARootCA.info | 2 src/accredited/RomanianGRID.info | 2 src/accredited/SRCE.info | 2 src/accredited/SiGNET-CA.info | 2 src/accredited/SlovakGrid.info | 4 src/accredited/SlovakGrid.pem | 16 src/accredited/TRGrid.crl_url | 1 src/accredited/TRGrid.info | 13 src/accredited/TRGrid.namespaces | 13 src/accredited/TRGrid.pem | 23 src/accredited/TRGrid.signing_policy | 5 src/accredited/TRGrid2024.info | 2 src/accredited/UGRID-G2.info | 2 src/accredited/UKeScienceCA-2B.info | 2 src/accredited/UKeScienceRoot-2007.info | 2 src/accredited/UNAMgrid-ca.info | 2 src/accredited/USERTrustECCCertificationAuthority.info | 2 src/accredited/USERTrustRSACertificationAuthority.info | 2 src/accredited/cilogon-basic.crl_url | 2 src/accredited/cilogon-basic.info | 9 src/accredited/cilogon-basic.namespaces | 12 src/accredited/cilogon-basic.pem | 23 src/accredited/cilogon-basic.signing_policy | 3 src/accredited/cilogon-silver.crl_url | 2 src/accredited/cilogon-silver.info | 9 src/accredited/cilogon-silver.namespaces | 12 src/accredited/cilogon-silver.pem | 23 src/accredited/cilogon-silver.signing_policy | 3 src/accredited/eMudhra-TrustedRootCAC4.info | 2 src/accredited/eMudhra-TrustedRootCAC5.info | 2 src/accredited/eMudhra-TrustedRootCAC5.namespaces | 6 src/accredited/eMudhra-TrustedRootCAC5.signing_policy | 2 src/accredited/emSignClass1CAG1.info | 2 src/accredited/emSignRootCAG1.info | 2 src/accredited/emSignRootTLSCAG1.crl_url | 1 src/accredited/emSignRootTLSCAG1.info | 16 src/accredited/emSignRootTLSCAG1.namespaces | 46 + src/accredited/emSignRootTLSCAG1.pem | 32 + src/accredited/emSignRootTLSCAG1.signing_policy | 5 src/accredited/emSignSSLCAG1.info | 2 src/accredited/emigtfc4.info | 2 src/accredited/emigtfc5.info | 2 src/accredited/emigtfc5r1.info | 2 src/accredited/seegrid-ca-2013.info | 2 src/experimental/InCommon-RSA-IGTF-Server-CA-2.info | 2 src/experimental/cilogon-openid.crl_url | 2 src/experimental/cilogon-openid.info | 9 src/experimental/cilogon-openid.namespaces | 12 src/experimental/cilogon-openid.pem | 23 src/experimental/cilogon-openid.signing_policy | 3 src/unaccredited/UKPathfinder1.info | 2 src/unaccredited/egee-ne-benelux-tutorial.info | 2 src/unaccredited/nl-e-infra-zero.info | 2 201 files changed, 1576 insertions(+), 1200 deletions(-) dpkg-source: warning: cannot verify inline signature for /srv/release.debian.org/tmp/tmp0pp2i_yq/igtf-policy-bundle_1.133-1~deb12u1.dsc: no acceptable signature found dpkg-source: warning: cannot verify inline signature for /srv/release.debian.org/tmp/tmp0pp2i_yq/igtf-policy-bundle_1.140-1~bpo12+1.dsc: no acceptable signature found diff -Nru igtf-policy-bundle-1.133/CHANGES igtf-policy-bundle-1.140/CHANGES --- igtf-policy-bundle-1.133/CHANGES 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/CHANGES 2026-03-25 13:54:48.000000000 +0000 @@ -5,14 +5,89 @@ Distribution and to be informed about important information on distribution lay-out. +Changes from 1.139 to 1.140 +--------------------------- +(30 March 2026) + +* Added server TLS specific trust hierarchy for eMudhra joint trust (IN) + +NOTE: this will be the last release to include a build with Gen3 GPG + package signatures. + This release also deprecates SSLeay and OpenSSL 0.x series subject name + hashes in the trust anchor directory (i.e. based on the MD5 encoding of the + binary encoding of the subject distinguised name). These will be removed + after August 2026. For reference, systems distributions dependent hereon + reached end of support in 2020 (RHEL5 ELS) or 2016 (for Debian 6 "Squeeze"). + +Changes from 1.138 to 1.139 +--------------------------- +(16 March 2026) + +* Update ArmeSFo CA re-issued based on SHA-2 family digest (AM) +* The IGTF DCVOTA assurance profile has been added. For details, please refer + to https://www.igtf.net/ap/dcvota/ + +Changes from 1.137 to 1.138 +--------------------------- +(1 December 2025) + +* Add new REUNA Issuing CA and updated RPDNC for HLCA emSign Trusted Root (CL) +* Withdraw superseded KEK CA (JP) +* Update RCauth Pilot ICA G1 with extended validity period (EU) + +Changes from 1.136 to 1.137 +--------------------------- +(15 September 2025) + +* Added accredited KEK-2024 classic issuing CA (JP) +* Withdrawn superseded TRGrid CA 2005 (TR) + +Changes from 1.135 to 1.136 +--------------------------- +(9 June 2025) + +* Added new CESNET CA Gen5 hierarchy and new off-line Root 2 (CZ) +* Withdrawn retired CILogon CAs cilogon-basic and cilogon-silver (US) +* a new version of the generation-4 package signing key is now included that + uses a SHA-256 digest function for its self-signature. Fingerprint and key + material is otherwise identical: 565F4528EAD3F53727B5A2E9B055005676341F1A. + +Changes from 1.134 to 1.135 +--------------------------- +(5 May 2025) + +* Updated SlovakGrid trust anchor with extended validity (SK) +* Withdrawn discontinued HPCI CA (JP) + +NOTE: the _default_ package signing key has changed to the 4th generation + for increased security and compatibility. The new key is a 2048 bit + RSA with fingerprint 565F4528EAD3F53727B5A2E9B055005676341F1A. + The GPG public key file can be retrieved from + https://dl.igtf.net/distribution/current/GPG-KEY-EUGridPMA-RPM-4 + and imported on rpm-based distributions with 'rpmkeys --import ' + or on Debian (apt) based systems set in Signed-By in sources.list or + added as a file in /etc/apt/trusted.gpg.d/ + + This change was first announced in the 1.122 release (August 2023), + but a distribution signed with the generation-3 key remains available. + A signature of the gen-4 key signed by the gen-3 GPG key is available + from https://dl.igtf.net/distribution/current/ for validation. + +Changes from 1.133 to 1.134 +--------------------------- +(5 March 2025) + +* New ANSPGrid CA 2 roll-over for root-issuer key pair (BR) +* Withdrawn discontinued AC-GRID-FR series authorities (FR) + Changes from 1.132 to 1.133 --------------------------- -(17 February 2024) +(21 February 2025) * Updated re-issued GridCanada root with extended validity period (CA) * Added GEANT TCS Generation 5 TLS and Auth ICAs and corresponding HARICA and private trust roots (EU) -* updated SHA-256 root CA for RDIG mitigating EL9/FedoraCore deprication +* updated SHA-256 root CA for RDIG mitigating EL9/FedoraCore deprecation * MARGI put on hold due to domainname resolution issues (MK) Changes from 1.131 to 1.132 diff -Nru igtf-policy-bundle-1.133/Makefile.tpl igtf-policy-bundle-1.140/Makefile.tpl --- igtf-policy-bundle-1.133/Makefile.tpl 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/Makefile.tpl 2026-03-25 13:54:48.000000000 +0000 @@ -20,9 +20,9 @@ # parts autogenerated by the PMA build script follow # -# Created: Tue Feb 11 20:08:28 2025 GMT +# Created: Wed Mar 25 13:54:48 2026 GMT # -install-classic: AC-GRID-FR AC-GRID-FR-Personnels AC-GRID-FR-Robots AC-GRID-FR-Services ANSPGrid ASGCCA-2007 ArmeSFo BG-ACAD-CA CERN-GridCA CERN-Root-2 CESNET-CA-4 CESNET-CA-Root DCAROOT-G1 DFN-GridGermany-Root DZeScience DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 DigiCertAssuredIDRootCA-Root DigiCertGridCA-1G2-Classic-2015 DigiCertGridRootCA-Root DigiCertGridTrustCAG2-Classic GEANTTCSRETrustECCRootCA5 GEANTTCSRETrustRSARootCA5 GEANTeScienceSSLCA4 GEANTeScienceSSLECCCA4 GridCanada HARICAGEANTTLSECC1 HARICAGEANTTLSRSA1 HARICAOVTLSECC HARICAOVTLSRSA HARICATLSECCRootCA2021 HARICATLSRSARootCA2021 HellasGrid-CA-2016 HellenicAcademicandResearchInstitutionsECCRootCA2015 HellenicAcademicandResearchInstitutionsRootCA2015 IGCA2 IHEP-2013 IRAN-GRID-GCG-G2 InCommon-RSA-IGTF-Server-CA-3 KEK KISTIv3 MREN-CA MaGrid NIKHEF NorduGrid-2015 PK-Grid-2007 PKIUNAMgrid PolishGrid-2019 RDIG REUNA-ca ResearchandEducationTrustECCRootCA ResearchandEducationTrustRSARootCA RomanianGRID SRCE SiGNET-CA SlovakGrid TRGrid TRGrid2024 UGRID-G2 UKeScienceCA-2B UKeScienceRoot-2007 UNAMgrid-ca USERTrustECCCertificationAuthority USERTrustRSACertificationAuthority eMudhra-TrustedRootCAC4 eMudhra-TrustedRootCAC5 emSignClass1CAG1 emSignRootCAG1 emSignSSLCAG1 emigtfc4 emigtfc5 emigtfc5r1 seegrid-ca-2013 +install-classic: ANSPGridCA2 ASGCCA-2007 ArmeSFo BG-ACAD-CA CERN-GridCA CERN-Root-2 CESNET-CA-4 CESNET-CA-5 CESNET-CA-Root CESNET-CA-Root2 DCAROOT-G1 DFN-GridGermany-Root DZeScience DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 DigiCertAssuredIDRootCA-Root DigiCertGridCA-1G2-Classic-2015 DigiCertGridRootCA-Root DigiCertGridTrustCAG2-Classic EMOVTLSCAG2A1 EMOVTLSCAG2B EMOVTLSCAG2C GEANTTCSRETrustECCRootCA5 GEANTTCSRETrustRSARootCA5 GEANTeScienceSSLCA4 GEANTeScienceSSLECCCA4 GridCanada HARICAGEANTTLSECC1 HARICAGEANTTLSRSA1 HARICAOVTLSECC HARICAOVTLSRSA HARICATLSECCRootCA2021 HARICATLSRSARootCA2021 HellasGrid-CA-2016 HellenicAcademicandResearchInstitutionsECCRootCA2015 HellenicAcademicandResearchInstitutionsRootCA2015 IGCA2 IHEP-2013 IRAN-GRID-GCG-G2 InCommon-RSA-IGTF-Server-CA-3 KEK2024 KISTIv3 MREN-CA MaGrid NIKHEF NorduGrid-2015 PK-Grid-2007 PKIUNAMgrid PolishGrid-2019 RDIG REUNA-ICA-C5 REUNA-ca ResearchandEducationTrustECCRootCA ResearchandEducationTrustRSARootCA RomanianGRID SRCE SiGNET-CA SlovakGrid TRGrid2024 UGRID-G2 UKeScienceCA-2B UKeScienceRoot-2007 UNAMgrid-ca USERTrustECCCertificationAuthority USERTrustRSACertificationAuthority eMudhra-TrustedRootCAC4 eMudhra-TrustedRootCAC5 emSignClass1CAG1 emSignRootCAG1 emSignRootTLSCAG1 emSignSSLCAG1 emigtfc4 emigtfc5 emigtfc5r1 seegrid-ca-2013 @echo Installing CAs for profile accredited:classic $(install) policy-igtf-classic.info $(prefix)/ @@ -30,19 +30,23 @@ @echo Installing CAs for profile accredited:slcs $(install) policy-igtf-slcs.info $(prefix)/ -install-mics: GEANTTCSAuthenticationECCCA4B GEANTTCSAuthenticationECCCA5 GEANTTCSAuthenticationRSACA4B GEANTTCSAuthenticationRSACA5 GEANTeSciencePersonalCA4 GEANTeSciencePersonalECCCA4 HPCI cilogon-silver +install-mics: GEANTTCSAuthenticationECCCA4B GEANTTCSAuthenticationECCCA5 GEANTTCSAuthenticationRSACA4B GEANTTCSAuthenticationRSACA5 GEANTeSciencePersonalCA4 GEANTeSciencePersonalECCCA4 @echo Installing CAs for profile accredited:mics $(install) policy-igtf-mics.info $(prefix)/ -install-iota: RCauth-Pilot-ICA-G1 cilogon-basic +install-iota: RCauth-Pilot-ICA-G1 @echo Installing CAs for profile accredited:iota $(install) policy-igtf-iota.info $(prefix)/ +install-dcvota: + @echo Installing CAs for profile accredited:dcvota + $(install) policy-igtf-dcvota.info $(prefix)/ + install-discontinued: @echo Installing CAs for profile discontinued $(install) policy-igtf-discontinued.info $(prefix)/ -install-experimental: InCommon-RSA-IGTF-Server-CA-2 cilogon-openid +install-experimental: InCommon-RSA-IGTF-Server-CA-2 @echo Installing CAs for profile experimental $(install) policy-igtf-experimental.info $(prefix)/ @@ -50,7 +54,7 @@ @echo Installing CAs for profile unaccredited $(install) policy-igtf-unaccredited.info $(prefix)/ -install-all-accredited: install-classic install-slcs install-mics install-iota +install-all-accredited: install-classic install-slcs install-mics install-iota install-dcvota @echo Installing all IGTF accredited CAs under ANY profile $(install) policy-igtf.info $(prefix)/ @@ -58,61 +62,18 @@ # single CA installations # -AC-GRID-FR: prep - $(install) src/accredited/AC-GRID-FR.crl_url $(prefix)/ - $(install) src/accredited/AC-GRID-FR.info $(prefix)/ - $(install) src/accredited/AC-GRID-FR.namespaces $(prefix)/ - $(install) src/accredited/AC-GRID-FR.pem $(prefix)/ - $(install) src/accredited/AC-GRID-FR.signing_policy $(prefix)/ - $(ln) -s AC-GRID-FR.pem $(prefix)/7ca9677b.0 - $(ln) -s AC-GRID-FR.pem $(prefix)/16054abd.0 - $(ln) -s AC-GRID-FR.signing_policy $(prefix)/7ca9677b.signing_policy - $(ln) -s AC-GRID-FR.signing_policy $(prefix)/16054abd.signing_policy - $(ln) -s AC-GRID-FR.namespaces $(prefix)/7ca9677b.namespaces - $(ln) -s AC-GRID-FR.namespaces $(prefix)/16054abd.namespaces - -AC-GRID-FR-Personnels: prep - $(install) src/accredited/AC-GRID-FR-Personnels.crl_url $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Personnels.info $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Personnels.pem $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Personnels.signing_policy $(prefix)/ - $(ln) -s AC-GRID-FR-Personnels.pem $(prefix)/80df9b28.0 - $(ln) -s AC-GRID-FR-Personnels.pem $(prefix)/72aa436d.0 - $(ln) -s AC-GRID-FR-Personnels.signing_policy $(prefix)/80df9b28.signing_policy - $(ln) -s AC-GRID-FR-Personnels.signing_policy $(prefix)/72aa436d.signing_policy - -AC-GRID-FR-Robots: prep - $(install) src/accredited/AC-GRID-FR-Robots.crl_url $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Robots.info $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Robots.pem $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Robots.signing_policy $(prefix)/ - $(ln) -s AC-GRID-FR-Robots.pem $(prefix)/3f638905.0 - $(ln) -s AC-GRID-FR-Robots.pem $(prefix)/37a553c6.0 - $(ln) -s AC-GRID-FR-Robots.signing_policy $(prefix)/3f638905.signing_policy - $(ln) -s AC-GRID-FR-Robots.signing_policy $(prefix)/37a553c6.signing_policy - -AC-GRID-FR-Services: prep - $(install) src/accredited/AC-GRID-FR-Services.crl_url $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Services.info $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Services.pem $(prefix)/ - $(install) src/accredited/AC-GRID-FR-Services.signing_policy $(prefix)/ - $(ln) -s AC-GRID-FR-Services.pem $(prefix)/14e86c33.0 - $(ln) -s AC-GRID-FR-Services.pem $(prefix)/5e02f50a.0 - $(ln) -s AC-GRID-FR-Services.signing_policy $(prefix)/14e86c33.signing_policy - $(ln) -s AC-GRID-FR-Services.signing_policy $(prefix)/5e02f50a.signing_policy - -ANSPGrid: prep - $(install) src/accredited/ANSPGrid.crl_url $(prefix)/ - $(install) src/accredited/ANSPGrid.info $(prefix)/ - $(install) src/accredited/ANSPGrid.namespaces $(prefix)/ - $(install) src/accredited/ANSPGrid.pem $(prefix)/ - $(install) src/accredited/ANSPGrid.signing_policy $(prefix)/ - $(ln) -s ANSPGrid.pem $(prefix)/126f0acf.0 - $(ln) -s ANSPGrid.pem $(prefix)/036b3363.0 - $(ln) -s ANSPGrid.signing_policy $(prefix)/126f0acf.signing_policy - $(ln) -s ANSPGrid.signing_policy $(prefix)/036b3363.signing_policy - $(ln) -s ANSPGrid.namespaces $(prefix)/126f0acf.namespaces - $(ln) -s ANSPGrid.namespaces $(prefix)/036b3363.namespaces +ANSPGridCA2: prep + $(install) src/accredited/ANSPGridCA2.crl_url $(prefix)/ + $(install) src/accredited/ANSPGridCA2.info $(prefix)/ + $(install) src/accredited/ANSPGridCA2.namespaces $(prefix)/ + $(install) src/accredited/ANSPGridCA2.pem $(prefix)/ + $(install) src/accredited/ANSPGridCA2.signing_policy $(prefix)/ + $(ln) -s ANSPGridCA2.pem $(prefix)/3d40580f.0 + $(ln) -s ANSPGridCA2.pem $(prefix)/dcaa370f.0 + $(ln) -s ANSPGridCA2.signing_policy $(prefix)/3d40580f.signing_policy + $(ln) -s ANSPGridCA2.signing_policy $(prefix)/dcaa370f.signing_policy + $(ln) -s ANSPGridCA2.namespaces $(prefix)/3d40580f.namespaces + $(ln) -s ANSPGridCA2.namespaces $(prefix)/dcaa370f.namespaces ASGCCA-2007: prep $(install) src/accredited/ASGCCA-2007.crl_url $(prefix)/ @@ -189,6 +150,19 @@ $(ln) -s CESNET-CA-4.namespaces $(prefix)/9c979c2b.namespaces $(ln) -s CESNET-CA-4.namespaces $(prefix)/84c78b97.namespaces +CESNET-CA-5: prep + $(install) src/accredited/CESNET-CA-5.crl_url $(prefix)/ + $(install) src/accredited/CESNET-CA-5.info $(prefix)/ + $(install) src/accredited/CESNET-CA-5.namespaces $(prefix)/ + $(install) src/accredited/CESNET-CA-5.pem $(prefix)/ + $(install) src/accredited/CESNET-CA-5.signing_policy $(prefix)/ + $(ln) -s CESNET-CA-5.pem $(prefix)/8d903d8c.0 + $(ln) -s CESNET-CA-5.pem $(prefix)/de364c76.0 + $(ln) -s CESNET-CA-5.signing_policy $(prefix)/8d903d8c.signing_policy + $(ln) -s CESNET-CA-5.signing_policy $(prefix)/de364c76.signing_policy + $(ln) -s CESNET-CA-5.namespaces $(prefix)/8d903d8c.namespaces + $(ln) -s CESNET-CA-5.namespaces $(prefix)/de364c76.namespaces + CESNET-CA-Root: prep $(install) src/accredited/CESNET-CA-Root.crl_url $(prefix)/ $(install) src/accredited/CESNET-CA-Root.info $(prefix)/ @@ -202,6 +176,19 @@ $(ln) -s CESNET-CA-Root.namespaces $(prefix)/edca0fc0.namespaces $(ln) -s CESNET-CA-Root.namespaces $(prefix)/f4401b90.namespaces +CESNET-CA-Root2: prep + $(install) src/accredited/CESNET-CA-Root2.crl_url $(prefix)/ + $(install) src/accredited/CESNET-CA-Root2.info $(prefix)/ + $(install) src/accredited/CESNET-CA-Root2.namespaces $(prefix)/ + $(install) src/accredited/CESNET-CA-Root2.pem $(prefix)/ + $(install) src/accredited/CESNET-CA-Root2.signing_policy $(prefix)/ + $(ln) -s CESNET-CA-Root2.pem $(prefix)/0e5250f2.0 + $(ln) -s CESNET-CA-Root2.pem $(prefix)/5d966674.0 + $(ln) -s CESNET-CA-Root2.signing_policy $(prefix)/0e5250f2.signing_policy + $(ln) -s CESNET-CA-Root2.signing_policy $(prefix)/5d966674.signing_policy + $(ln) -s CESNET-CA-Root2.namespaces $(prefix)/0e5250f2.namespaces + $(ln) -s CESNET-CA-Root2.namespaces $(prefix)/5d966674.namespaces + DCAROOT-G1: prep $(install) src/accredited/DCAROOT-G1.crl_url $(prefix)/ $(install) src/accredited/DCAROOT-G1.info $(prefix)/ @@ -319,6 +306,45 @@ $(ln) -s DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/5d9ea26d.namespaces $(ln) -s DigiCertGridTrustCAG2-Classic.namespaces $(prefix)/bd43b60c.namespaces +EMOVTLSCAG2A1: prep + $(install) src/accredited/EMOVTLSCAG2A1.crl_url $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2A1.info $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2A1.namespaces $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2A1.pem $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2A1.signing_policy $(prefix)/ + $(ln) -s EMOVTLSCAG2A1.pem $(prefix)/13d774dd.0 + $(ln) -s EMOVTLSCAG2A1.pem $(prefix)/7fa91558.0 + $(ln) -s EMOVTLSCAG2A1.signing_policy $(prefix)/13d774dd.signing_policy + $(ln) -s EMOVTLSCAG2A1.signing_policy $(prefix)/7fa91558.signing_policy + $(ln) -s EMOVTLSCAG2A1.namespaces $(prefix)/13d774dd.namespaces + $(ln) -s EMOVTLSCAG2A1.namespaces $(prefix)/7fa91558.namespaces + +EMOVTLSCAG2B: prep + $(install) src/accredited/EMOVTLSCAG2B.crl_url $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2B.info $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2B.namespaces $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2B.pem $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2B.signing_policy $(prefix)/ + $(ln) -s EMOVTLSCAG2B.pem $(prefix)/11137315.0 + $(ln) -s EMOVTLSCAG2B.pem $(prefix)/4af9d8d6.0 + $(ln) -s EMOVTLSCAG2B.signing_policy $(prefix)/11137315.signing_policy + $(ln) -s EMOVTLSCAG2B.signing_policy $(prefix)/4af9d8d6.signing_policy + $(ln) -s EMOVTLSCAG2B.namespaces $(prefix)/11137315.namespaces + $(ln) -s EMOVTLSCAG2B.namespaces $(prefix)/4af9d8d6.namespaces + +EMOVTLSCAG2C: prep + $(install) src/accredited/EMOVTLSCAG2C.crl_url $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2C.info $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2C.namespaces $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2C.pem $(prefix)/ + $(install) src/accredited/EMOVTLSCAG2C.signing_policy $(prefix)/ + $(ln) -s EMOVTLSCAG2C.pem $(prefix)/f70d2fca.0 + $(ln) -s EMOVTLSCAG2C.pem $(prefix)/5936c65e.0 + $(ln) -s EMOVTLSCAG2C.signing_policy $(prefix)/f70d2fca.signing_policy + $(ln) -s EMOVTLSCAG2C.signing_policy $(prefix)/5936c65e.signing_policy + $(ln) -s EMOVTLSCAG2C.namespaces $(prefix)/f70d2fca.namespaces + $(ln) -s EMOVTLSCAG2C.namespaces $(prefix)/5936c65e.namespaces + GEANTTCSAuthenticationECCCA4B: prep $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.crl_url $(prefix)/ $(install) src/accredited/GEANTTCSAuthenticationECCCA4B.info $(prefix)/ @@ -540,19 +566,6 @@ $(ln) -s HARICATLSRSARootCA2021.namespaces $(prefix)/b92fd57f.namespaces $(ln) -s HARICATLSRSARootCA2021.namespaces $(prefix)/9f727ac7.namespaces -HPCI: prep - $(install) src/accredited/HPCI.crl_url $(prefix)/ - $(install) src/accredited/HPCI.info $(prefix)/ - $(install) src/accredited/HPCI.namespaces $(prefix)/ - $(install) src/accredited/HPCI.pem $(prefix)/ - $(install) src/accredited/HPCI.signing_policy $(prefix)/ - $(ln) -s HPCI.pem $(prefix)/30351739.0 - $(ln) -s HPCI.pem $(prefix)/61cd35bd.0 - $(ln) -s HPCI.signing_policy $(prefix)/30351739.signing_policy - $(ln) -s HPCI.signing_policy $(prefix)/61cd35bd.signing_policy - $(ln) -s HPCI.namespaces $(prefix)/30351739.namespaces - $(ln) -s HPCI.namespaces $(prefix)/61cd35bd.namespaces - HellasGrid-CA-2016: prep $(install) src/accredited/HellasGrid-CA-2016.crl_url $(prefix)/ $(install) src/accredited/HellasGrid-CA-2016.info $(prefix)/ @@ -651,18 +664,18 @@ $(ln) -s InCommon-RSA-IGTF-Server-CA-3.signing_policy $(prefix)/3cbc995f.signing_policy $(ln) -s InCommon-RSA-IGTF-Server-CA-3.signing_policy $(prefix)/1e49ade3.signing_policy -KEK: prep - $(install) src/accredited/KEK.crl_url $(prefix)/ - $(install) src/accredited/KEK.info $(prefix)/ - $(install) src/accredited/KEK.namespaces $(prefix)/ - $(install) src/accredited/KEK.pem $(prefix)/ - $(install) src/accredited/KEK.signing_policy $(prefix)/ - $(ln) -s KEK.pem $(prefix)/617ff41b.0 - $(ln) -s KEK.pem $(prefix)/2f2f573f.0 - $(ln) -s KEK.signing_policy $(prefix)/617ff41b.signing_policy - $(ln) -s KEK.signing_policy $(prefix)/2f2f573f.signing_policy - $(ln) -s KEK.namespaces $(prefix)/617ff41b.namespaces - $(ln) -s KEK.namespaces $(prefix)/2f2f573f.namespaces +KEK2024: prep + $(install) src/accredited/KEK2024.crl_url $(prefix)/ + $(install) src/accredited/KEK2024.info $(prefix)/ + $(install) src/accredited/KEK2024.namespaces $(prefix)/ + $(install) src/accredited/KEK2024.pem $(prefix)/ + $(install) src/accredited/KEK2024.signing_policy $(prefix)/ + $(ln) -s KEK2024.pem $(prefix)/65b18fb8.0 + $(ln) -s KEK2024.pem $(prefix)/e7a6d5cc.0 + $(ln) -s KEK2024.signing_policy $(prefix)/65b18fb8.signing_policy + $(ln) -s KEK2024.signing_policy $(prefix)/e7a6d5cc.signing_policy + $(ln) -s KEK2024.namespaces $(prefix)/65b18fb8.namespaces + $(ln) -s KEK2024.namespaces $(prefix)/e7a6d5cc.namespaces KISTIv3: prep $(install) src/accredited/KISTIv3.crl_url $(prefix)/ @@ -794,6 +807,19 @@ $(ln) -s RDIG.namespaces $(prefix)/55994d72.namespaces $(ln) -s RDIG.namespaces $(prefix)/94b468c6.namespaces +REUNA-ICA-C5: prep + $(install) src/accredited/REUNA-ICA-C5.crl_url $(prefix)/ + $(install) src/accredited/REUNA-ICA-C5.info $(prefix)/ + $(install) src/accredited/REUNA-ICA-C5.namespaces $(prefix)/ + $(install) src/accredited/REUNA-ICA-C5.pem $(prefix)/ + $(install) src/accredited/REUNA-ICA-C5.signing_policy $(prefix)/ + $(ln) -s REUNA-ICA-C5.pem $(prefix)/44598b15.0 + $(ln) -s REUNA-ICA-C5.pem $(prefix)/c5c30f5f.0 + $(ln) -s REUNA-ICA-C5.signing_policy $(prefix)/44598b15.signing_policy + $(ln) -s REUNA-ICA-C5.signing_policy $(prefix)/c5c30f5f.signing_policy + $(ln) -s REUNA-ICA-C5.namespaces $(prefix)/44598b15.namespaces + $(ln) -s REUNA-ICA-C5.namespaces $(prefix)/c5c30f5f.namespaces + REUNA-ca: prep $(install) src/accredited/REUNA-ca.crl_url $(prefix)/ $(install) src/accredited/REUNA-ca.info $(prefix)/ @@ -885,19 +911,6 @@ $(ln) -s SlovakGrid.namespaces $(prefix)/e13e0fcf.namespaces $(ln) -s SlovakGrid.namespaces $(prefix)/e21dc0c0.namespaces -TRGrid: prep - $(install) src/accredited/TRGrid.crl_url $(prefix)/ - $(install) src/accredited/TRGrid.info $(prefix)/ - $(install) src/accredited/TRGrid.namespaces $(prefix)/ - $(install) src/accredited/TRGrid.pem $(prefix)/ - $(install) src/accredited/TRGrid.signing_policy $(prefix)/ - $(ln) -s TRGrid.pem $(prefix)/1691b9ba.0 - $(ln) -s TRGrid.pem $(prefix)/87429ba3.0 - $(ln) -s TRGrid.signing_policy $(prefix)/1691b9ba.signing_policy - $(ln) -s TRGrid.signing_policy $(prefix)/87429ba3.signing_policy - $(ln) -s TRGrid.namespaces $(prefix)/1691b9ba.namespaces - $(ln) -s TRGrid.namespaces $(prefix)/87429ba3.namespaces - TRGrid2024: prep $(install) src/accredited/TRGrid2024.crl_url $(prefix)/ $(install) src/accredited/TRGrid2024.info $(prefix)/ @@ -999,45 +1012,6 @@ $(ln) -s USERTrustRSACertificationAuthority.namespaces $(prefix)/35105088.namespaces $(ln) -s USERTrustRSACertificationAuthority.namespaces $(prefix)/fc5a8f99.namespaces -cilogon-basic: prep - $(install) src/accredited/cilogon-basic.crl_url $(prefix)/ - $(install) src/accredited/cilogon-basic.info $(prefix)/ - $(install) src/accredited/cilogon-basic.namespaces $(prefix)/ - $(install) src/accredited/cilogon-basic.pem $(prefix)/ - $(install) src/accredited/cilogon-basic.signing_policy $(prefix)/ - $(ln) -s cilogon-basic.pem $(prefix)/28776852.0 - $(ln) -s cilogon-basic.pem $(prefix)/c2868627.0 - $(ln) -s cilogon-basic.signing_policy $(prefix)/28776852.signing_policy - $(ln) -s cilogon-basic.signing_policy $(prefix)/c2868627.signing_policy - $(ln) -s cilogon-basic.namespaces $(prefix)/28776852.namespaces - $(ln) -s cilogon-basic.namespaces $(prefix)/c2868627.namespaces - -cilogon-openid: prep - $(install) src/experimental/cilogon-openid.crl_url $(prefix)/ - $(install) src/experimental/cilogon-openid.info $(prefix)/ - $(install) src/experimental/cilogon-openid.namespaces $(prefix)/ - $(install) src/experimental/cilogon-openid.pem $(prefix)/ - $(install) src/experimental/cilogon-openid.signing_policy $(prefix)/ - $(ln) -s cilogon-openid.pem $(prefix)/3d863bc5.0 - $(ln) -s cilogon-openid.pem $(prefix)/9629661e.0 - $(ln) -s cilogon-openid.signing_policy $(prefix)/3d863bc5.signing_policy - $(ln) -s cilogon-openid.signing_policy $(prefix)/9629661e.signing_policy - $(ln) -s cilogon-openid.namespaces $(prefix)/3d863bc5.namespaces - $(ln) -s cilogon-openid.namespaces $(prefix)/9629661e.namespaces - -cilogon-silver: prep - $(install) src/accredited/cilogon-silver.crl_url $(prefix)/ - $(install) src/accredited/cilogon-silver.info $(prefix)/ - $(install) src/accredited/cilogon-silver.namespaces $(prefix)/ - $(install) src/accredited/cilogon-silver.pem $(prefix)/ - $(install) src/accredited/cilogon-silver.signing_policy $(prefix)/ - $(ln) -s cilogon-silver.pem $(prefix)/10718cba.0 - $(ln) -s cilogon-silver.pem $(prefix)/01b5d333.0 - $(ln) -s cilogon-silver.signing_policy $(prefix)/10718cba.signing_policy - $(ln) -s cilogon-silver.signing_policy $(prefix)/01b5d333.signing_policy - $(ln) -s cilogon-silver.namespaces $(prefix)/10718cba.namespaces - $(ln) -s cilogon-silver.namespaces $(prefix)/01b5d333.namespaces - eMudhra-TrustedRootCAC4: prep $(install) src/accredited/eMudhra-TrustedRootCAC4.crl_url $(prefix)/ $(install) src/accredited/eMudhra-TrustedRootCAC4.info $(prefix)/ @@ -1103,6 +1077,19 @@ $(ln) -s emSignRootCAG1.namespaces $(prefix)/f459871d.namespaces $(ln) -s emSignRootCAG1.namespaces $(prefix)/2923b3f9.namespaces +emSignRootTLSCAG1: prep + $(install) src/accredited/emSignRootTLSCAG1.crl_url $(prefix)/ + $(install) src/accredited/emSignRootTLSCAG1.info $(prefix)/ + $(install) src/accredited/emSignRootTLSCAG1.namespaces $(prefix)/ + $(install) src/accredited/emSignRootTLSCAG1.pem $(prefix)/ + $(install) src/accredited/emSignRootTLSCAG1.signing_policy $(prefix)/ + $(ln) -s emSignRootTLSCAG1.pem $(prefix)/85e5a2bb.0 + $(ln) -s emSignRootTLSCAG1.pem $(prefix)/2ea0d293.0 + $(ln) -s emSignRootTLSCAG1.signing_policy $(prefix)/85e5a2bb.signing_policy + $(ln) -s emSignRootTLSCAG1.signing_policy $(prefix)/2ea0d293.signing_policy + $(ln) -s emSignRootTLSCAG1.namespaces $(prefix)/85e5a2bb.namespaces + $(ln) -s emSignRootTLSCAG1.namespaces $(prefix)/2ea0d293.namespaces + emSignSSLCAG1: prep $(install) src/accredited/emSignSSLCAG1.crl_url $(prefix)/ $(install) src/accredited/emSignSSLCAG1.info $(prefix)/ diff -Nru igtf-policy-bundle-1.133/README.txt igtf-policy-bundle-1.140/README.txt --- igtf-policy-bundle-1.133/README.txt 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/README.txt 2026-03-25 13:54:48.000000000 +0000 @@ -1,6 +1,6 @@ -IGTF Authority Trust Anchor Installation Bundle version 1.133 +IGTF Authority Trust Anchor Installation Bundle version 1.140 ----------------------------------------------------------------- -(release 1, issued on Tuesday, 11 Feb, 2025) +(release 1, issued on Wednesday, 25 Mar, 2026) This installation bundle contains the trust anchor sources for all IGTF distributed authorities. It must be configured before @@ -59,6 +59,8 @@ mics -- Member Integrated Credential generation Services iota -- Identifier-Only Trust Assurance Services - PLEASE read profile first at https://www.eugridpma.org/guidelines/IOTA/ + dcvota -- Domain Control Validation Only Trust Assurance - server- + side only authentication based on validated domain names Notes: * there is no collective installation for experimental or unaccredited diff -Nru igtf-policy-bundle-1.133/debian/.gitlab-ci.yml igtf-policy-bundle-1.140/debian/.gitlab-ci.yml --- igtf-policy-bundle-1.133/debian/.gitlab-ci.yml 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/.gitlab-ci.yml 2026-04-13 12:56:08.000000000 +0000 @@ -1,12 +1,54 @@ +# Pipeline for building debian package + stages: - package + - deploy + - release + +variables: + PACKAGE_REGISTRY_URL: "${CI_API_V4_URL}/projects/${CI_PROJECT_ID}/packages/generic/igtf-policy-bundle" package_bookworm: stage: package tags: - shell script: - - mkdir ../build-area - - uscan --destdir=../build-area/ --download --download-current-version + - mkdir build-area + - uscan --destdir=build-area/ --download --download-current-version - dch --bpo "" - - gbp buildpackage --git-overlay --git-export-dir=../build-area --git-ignore-branch + - gbp buildpackage --git-overlay --git-export-dir=build-area/ --git-ignore-branch --git-ignore-new --no-sign + artifacts: + paths: + - build-area/ + +publish: + stage: deploy + tags: + - shell + script: + - | + for i in build-area/*.deb; do + j=`basename ${i}` + curl --location --header "JOB-TOKEN: ${CI_JOB_TOKEN}" \ + --upload-file ${i} \ + "${PACKAGE_REGISTRY_URL}/${CI_COMMIT_TAG}/${j}" + done + rules: + - if: $CI_COMMIT_TAG + +release_job: + stage: release + tags: + - docker + image: registry.gitlab.com/gitlab-org/release-cli:latest + rules: + - if: $CI_COMMIT_TAG # Run this job when a tag is created + script: + - echo "running release_job" + - BASETAG=`basename ${CI_COMMIT_TAG} + - | + release-cli create --name "Release $CI_COMMIT_TAG" --tag-name $CI_COMMIT_TAG \ + --assets-link "{\"name\":\"igtf-policy-classic_${BASETAG}_all.deb\",\"url\":\"${PACKAGE_REGISTRY_URL}/${BASETAG}/igtf-policy-classic_${BASETAG}_all.deb\"}" \ + --assets-link "{\"name\":\"igtf-policy-mics_${BASETAG}_all.deb\",\"url\":\"${PACKAGE_REGISTRY_URL}/${BASETAG}/igtf-policy-mics_${BASETAG}_all.deb\"}" \ + --assets-link "{\"name\":\"igtf-policy-slcs_${BASETAG}_all.deb\",\"url\":\"${PACKAGE_REGISTRY_URL}/${BASETAG}/igtf-policy-slcs_${BASETAG}_all.deb\"}" \ + --assets-link "{\"name\":\"igtf-policy-iota_${BASETAG}_all.deb\",\"url\":\"${PACKAGE_REGISTRY_URL}/${BASETAG}/igtf-policy-iota_${BASETAG}_all.deb\"}" \ diff -Nru igtf-policy-bundle-1.133/debian/changelog igtf-policy-bundle-1.140/debian/changelog --- igtf-policy-bundle-1.133/debian/changelog 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/changelog 2026-04-13 12:56:08.000000000 +0000 @@ -1,8 +1,100 @@ -igtf-policy-bundle (1.133-1~deb12u1) bookworm; urgency=medium +igtf-policy-bundle (1.140-1~bpo12+1) bookworm-backports; urgency=medium - * Backport current policy bundle to bookworm + * Rebuild for bookworm-backports. - -- Dennis van Dok Wed, 05 Mar 2025 13:55:59 +0100 + -- Dennis van Dok Mon, 13 Apr 2026 14:56:08 +0200 + +igtf-policy-bundle (1.140-1) unstable; urgency=medium + + * New upstream release: + * Added server TLS specific trust hierarchy for eMudhra joint trust (IN) + + -- Dennis van Dok Mon, 30 Mar 2026 13:15:20 +0200 + +igtf-policy-bundle (1.139-1~bpo12+1) bookworm-backports; urgency=medium + + * Rebuild for bookworm-backports + + -- Dennis van Dok Thu, 26 Mar 2026 11:47:01 +0100 + +igtf-policy-bundle (1.139-1) unstable; urgency=medium + + * New upstream release: + * Update ArmeSFo CA re-issued based on SHA-2 family digest (AM) + * The IGTF DCVOTA assurance profile has been added. For details, please + refer to https://www.igtf.net/ap/dcvota/ + + -- Dennis van Dok Tue, 17 Mar 2026 12:14:35 +0100 + +igtf-policy-bundle (1.138-1~bpo12+1) bookworm-backports; urgency=medium + + * Backport for bookworm + + -- Dennis van Dok Mon, 08 Dec 2025 11:30:10 +0100 + +igtf-policy-bundle (1.138-1) unstable; urgency=medium + + * New upstream release: + * Add new REUNA Issuing CA and updated RPDNC for HLCA emSign Trusted Root (CL) + * Withdraw superseded KEK CA (JP) + * Update RCauth Pilot ICA G1 with extended validity period (EU) + * [Debconf translation updates] + * Catalan (Carles Pina i Estany). Closes: #1120091 + + -- Dennis van Dok Mon, 01 Dec 2025 11:40:38 +0100 + +igtf-policy-bundle (1.137-1~bpo12+1) bookworm-backports; urgency=medium + + * Backport for bookworm + + -- Dennis van Dok Wed, 01 Oct 2025 15:26:18 +0200 + +igtf-policy-bundle (1.137-1) unstable; urgency=medium + + * New upstream release: + * Added accredited KEK-2024 classic issuing CA (JP) + * Withdrawn superseded TRGrid CA 2005 (TR) + + -- Dennis van Dok Mon, 15 Sep 2025 10:27:37 +0200 + +igtf-policy-bundle (1.136-1) unstable; urgency=medium + + * New upstream release (9 June 2025): + * Added new CESNET CA Gen5 hierarchy and new off-line Root 2 (CZ) + * Withdrawn retired CILogon CAs cilogon-basic and cilogon-silver (US) + * a new version of the generation-4 package signing key is now included that + uses a SHA-256 digest function for its self-signature. Fingerprint and key + material is otherwise identical: 565F4528EAD3F53727B5A2E9B055005676341F1A. + + -- Dennis van Dok Fri, 06 Jun 2025 21:59:34 +0200 + +igtf-policy-bundle (1.135-1) unstable; urgency=medium + + * New upstream release: + * Updated SlovakGrid trust anchor with extended validity (SK) + * Withdrawn discontinued HPCI CA (JP) + + -- Dennis van Dok Thu, 08 May 2025 14:32:53 +0200 + +igtf-policy-bundle (1.134-1~bpo12+1) bookworm-backports; urgency=medium + + * Backport for bookworm + + -- Dennis van Dok Mon, 17 Mar 2025 11:43:22 +0100 + +igtf-policy-bundle (1.134-1) unstable; urgency=medium + + * New upstream release: + * New ANSPGrid CA 2 roll-over for root-issuer key pair (BR) + * Withdrawn discontinued AC-GRID-FR series authorities (FR) + + -- Dennis van Dok Wed, 12 Mar 2025 12:30:08 +0100 + +igtf-policy-bundle (1.133-1~bpo12+1) bookworm-backports; urgency=medium + + * Backport for bookworm + + -- Dennis van Dok Wed, 05 Mar 2025 11:33:49 +0100 igtf-policy-bundle (1.133-1) unstable; urgency=medium @@ -54,11 +146,11 @@ -- Dennis van Dok Mon, 24 Jun 2024 13:46:11 +0200 -igtf-policy-bundle (1.128-1~deb12u1) bookworm; urgency=important +igtf-policy-bundle (1.128-1~bpo12+1) bookworm-backports; urgency=medium - * Proposed update to address CAB Forum S/MIME policy change + * Backport for bookworm - -- Dennis van Dok Wed, 10 Apr 2024 13:40:25 +0200 + -- Dennis van Dok Mon, 08 Apr 2024 11:51:46 +0200 igtf-policy-bundle (1.128-1) unstable; urgency=medium diff -Nru igtf-policy-bundle-1.133/debian/control igtf-policy-bundle-1.140/debian/control --- igtf-policy-bundle-1.133/debian/control 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/control 2026-04-13 12:56:08.000000000 +0000 @@ -3,14 +3,14 @@ Priority: optional Maintainer: Dennis van Dok Build-Depends: debhelper-compat (= 13), po-debconf -Standards-Version: 4.6.2 +Standards-Version: 4.7.3 Homepage: https://www.igtf.net/ -Vcs-Git: https://github.com/dvandok/igtf-policy-bundle.git -Vcs-Browser: https://github.com/dvandok/igtf-policy-bundle - +Vcs-Git: https://salsa.debian.org/dennisvd/igtf-policy-bundle.git +Vcs-Browser: https://salsa.debian.org/dennisvd/igtf-policy-bundle Package: igtf-policy-classic Architecture: all +Multi-Arch: foreign Depends: ${misc:Depends} Recommends: openssl Suggests: fetch-crl @@ -26,6 +26,7 @@ Package: igtf-policy-mics Architecture: all +Multi-Arch: foreign Depends: ${misc:Depends} Recommends: openssl Suggests: fetch-crl @@ -42,6 +43,7 @@ Package: igtf-policy-slcs Architecture: all +Multi-Arch: foreign Depends: ${misc:Depends} Recommends: openssl Suggests: fetch-crl @@ -58,6 +60,7 @@ Package: igtf-policy-iota Architecture: all +Multi-Arch: foreign Depends: ${misc:Depends} Recommends: openssl Suggests: fetch-crl @@ -74,6 +77,7 @@ Package: igtf-policy-unaccredited Architecture: all +Multi-Arch: foreign Depends: ${misc:Depends} Recommends: openssl Description: IGTF unaccredited Certificate Authorities @@ -88,6 +92,7 @@ Package: igtf-policy-experimental Architecture: all +Multi-Arch: foreign Depends: ${misc:Depends} Recommends: openssl Description: IGTF experimental Certificate Authorities diff -Nru igtf-policy-bundle-1.133/debian/gbp.conf igtf-policy-bundle-1.140/debian/gbp.conf --- igtf-policy-bundle-1.133/debian/gbp.conf 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/gbp.conf 2026-04-13 12:56:08.000000000 +0000 @@ -0,0 +1,5 @@ +[DEFAULT] +pristine-tar = false + +[buildpackage] +overlay=true diff -Nru igtf-policy-bundle-1.133/debian/po/ca.po igtf-policy-bundle-1.140/debian/po/ca.po --- igtf-policy-bundle-1.133/debian/po/ca.po 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/po/ca.po 2026-04-13 12:56:08.000000000 +0000 @@ -0,0 +1,100 @@ +# Catalan translation of igtf-policy-bundle's debconf messages +# Copyright © 2025 poc senderi +# This file is distributed under the same license as the igtf-policy-bundle package. +# poc senderi , 2025. +# +msgid "" +msgstr "" +"Project-Id-Version: igtf-policy-bundle\n" +"Report-Msgid-Bugs-To: igtf-policy-bundle@packages.debian.org\n" +"POT-Creation-Date: 2017-07-24 17:44+0200\n" +"PO-Revision-Date: 2025-11-05 07:37+0100\n" +"Last-Translator: poc senderi \n" +"Language-Team: Catalan \n" +"Language: ca\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" +"X-Generator: Poedit 3.6\n" + +#. Type: boolean +#. Description +#: ../templates.in:2001 +msgid "Trust IGTF @PROFILE@ CAs by default?" +msgstr "Voleu, de manera predeterminada, confiar en les CA d'IGTF @PROFILE@?" + +#. Type: boolean +#. Description +#: ../templates.in:2001 +msgid "" +"Trusted IGTF Certification Authority certificates are installed in $" +"{location}." +msgstr "" +"Els certificats de confiança de la IGTF Certification Authority estan " +"instal·lats a ${location}." + +#. Type: boolean +#. Description +#: ../templates.in:2001 +msgid "" +"Accept this option to have certificates included by default unless they are " +"explicitly excluded. Reject it to choose the reverse policy, excluding them " +"unless explicitly included." +msgstr "" +"Accepteu aquesta opció per a tenir inclosos els certificats de manera " +"predeterminada tret que hagin estat explícitament exclosos. Refuseu per " +"triar la política inversa, excloent-los tots excepte aquells que s'hagin " +"inclòs implícitament." + +#. Type: boolean +#. Description +#: ../templates.in:2001 +msgid "You will then have the opportunity to define the list of exceptions." +msgstr "Tindreu la possibilitat de definir la llista d'excepcions." + +#. Type: multiselect +#. Description +#: ../templates.in:3001 +msgid "Certificates to explicitly exclude:" +msgstr "Certificats que explícitament s'exclouran:" + +#. Type: multiselect +#. Description +#: ../templates.in:3001 +msgid "" +"Please select which certificates should not be installed in ${location}." +msgstr "Seleccioneu quins certificats no s'han d'instal·lar a ${location}." + +#. Type: multiselect +#. Description +#: ../templates.in:4001 +msgid "Certificates to explicitly include:" +msgstr "Certificats que explícitament s'inclouran:" + +#. Type: multiselect +#. Description +#: ../templates.in:4001 +msgid "Please select which certificates should be installed in ${location}." +msgstr "Seleccioneu quins certificats s'han d'instal·lar a ${location}." + +#. Type: string +#. Description +#: ../templates.in:5001 +msgid "Installation directory of the certificates:" +msgstr "Directori d'instal·lació dels certificats:" + +#. Type: string +#. Description +#: ../templates.in:5001 +msgid "" +"The default location /etc/grid-security/certificates should work fine in " +"most cases." +msgstr "" +"La ubicació predeterminada, «/etc/grid-security/certificates», hauria " +"d'anar bé en la majoria de casos." + +#. Type: string +#. Description +#: ../templates.in:5001 +msgid "An alternative location can be given here if needed." +msgstr "Si convingués, es pot posar aquí una ubicació alternativa." diff -Nru igtf-policy-bundle-1.133/debian/po/templates.pot igtf-policy-bundle-1.140/debian/po/templates.pot --- igtf-policy-bundle-1.133/debian/po/templates.pot 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/po/templates.pot 2026-04-13 12:56:08.000000000 +0000 @@ -8,7 +8,7 @@ msgstr "" "Project-Id-Version: igtf-policy-bundle\n" "Report-Msgid-Bugs-To: igtf-policy-bundle@packages.debian.org\n" -"POT-Creation-Date: 2017-07-24 17:44+0200\n" +"POT-Creation-Date: 2026-03-30 12:37+0200\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME \n" "Language-Team: LANGUAGE \n" @@ -27,8 +27,8 @@ #. Description #: ../templates.in:2001 msgid "" -"Trusted IGTF Certification Authority certificates are installed in " -"${location}." +"Trusted IGTF Certification Authority certificates are installed in $" +"{location}." msgstr "" #. Type: boolean diff -Nru igtf-policy-bundle-1.133/debian/rules igtf-policy-bundle-1.140/debian/rules --- igtf-policy-bundle-1.133/debian/rules 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/rules 2026-04-13 12:56:08.000000000 +0000 @@ -31,28 +31,28 @@ override_dh_installdirs: cd debian && for profile in $(PROFILES); do \ - cp dirs.in igtf-policy-$$profile.dirs ; \ + cp dirs.in igtf-policy-$$profile.dirs ; \ done dh_installdirs override_dh_auto_install: profile_files for profile in $(PROFILES) unaccredited experimental; do \ - mkdir -p debian/tmp/$(BASE)/$$profile ; \ - mkdir -p debian/tmp/usr/share/ca-certificates/igtf-$$profile ; \ - make install-$$profile prefix=`pwd`/debian/tmp/$(BASE)/$$profile ; \ + mkdir -p debian/tmp/$(BASE)/$$profile ; \ + mkdir -p debian/tmp/usr/share/ca-certificates/igtf-$$profile ; \ + make install-$$profile prefix=`pwd`/debian/tmp/$(BASE)/$$profile ; \ done profile_files: po2debconf debian/templates.in > debian/templates-translated.in cd debian && for profile in $(PROFILES); do \ - sed -e "s/@PROFILE@/$$profile/g" < config.in > igtf-policy-$$profile.config ; \ - sed -e "s/@PROFILE@/$$profile/g" < postinst.in > igtf-policy-$$profile.postinst ; \ - sed -e "s/@PROFILE@/$$profile/g;s/@DEBVER@/$(DEBVER)/" < prerm.in > igtf-policy-$$profile.prerm ; \ - sed -e "s/@PROFILE@/$$profile/g" < templates-translated.in > igtf-policy-$$profile.templates ; \ + sed -e "s/@PROFILE@/$$profile/g" < config.in > igtf-policy-$$profile.config ; \ + sed -e "s/@PROFILE@/$$profile/g" < postinst.in > igtf-policy-$$profile.postinst ; \ + sed -e "s/@PROFILE@/$$profile/g;s/@DEBVER@/$(DEBVER)/" < prerm.in > igtf-policy-$$profile.prerm ; \ + sed -e "s/@PROFILE@/$$profile/g" < templates-translated.in > igtf-policy-$$profile.templates ; \ done cd debian && for profile in $(PROFILES) unaccredited experimental; do \ - sed -e "s/@PROFILE@/$$profile/g" < install.in > igtf-policy-$$profile.install ; \ - cp docs.in igtf-policy-$$profile.docs ; \ + sed -e "s/@PROFILE@/$$profile/g" < install.in > igtf-policy-$$profile.install ; \ + cp docs.in igtf-policy-$$profile.docs ; \ done # The .info files aren't GNU Info files diff -Nru igtf-policy-bundle-1.133/debian/salsa-ci.yml igtf-policy-bundle-1.140/debian/salsa-ci.yml --- igtf-policy-bundle-1.133/debian/salsa-ci.yml 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/salsa-ci.yml 2026-04-13 12:56:08.000000000 +0000 @@ -0,0 +1,3 @@ +--- +include: + - https://salsa.debian.org/salsa-ci-team/pipeline/raw/master/recipes/debian.yml diff -Nru igtf-policy-bundle-1.133/debian/upstream/signing-key.asc igtf-policy-bundle-1.140/debian/upstream/signing-key.asc --- igtf-policy-bundle-1.133/debian/upstream/signing-key.asc 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/upstream/signing-key.asc 2026-04-13 12:56:08.000000000 +0000 @@ -1,6 +1,6 @@ -----BEGIN PGP PUBLIC KEY BLOCK----- -mQGiBELTiyYRBAD8goP2vWdf46e/stZvzgkBgJIFTMkHqZOpLqlCKTRGf4VHUASh +xsDiBELTiyYRBAD8goP2vWdf46e/stZvzgkBgJIFTMkHqZOpLqlCKTRGf4VHUASh hdaktDtPx44fVO4E3zmugc7FP6xz/Hj3SqrUKt98vzF1EMb3i4UMCOBif+jM6VFS N5N3gDEukNpP2h46LkNPbRPgAEeUmUZy4kTyB9xC/VA7d1sFx6sJZpCHiwCg7DNX bj4Wuk5b+FyyCOg9++xabokEAJwt4+iyDX3uYZrkzh9hOXgrbBiyGrorAz3jOpqM @@ -8,9 +8,35 @@ 8PaV3vdb5C5SRSbRgvxoUOo6eGVBpv8bVpKm//tNkTboHVsEAKQ1rYzx/m89aCZj VCw5A/0c3E0rH4ZCeNg7yvta9ur3U7n/aFhzbU3wFLhcIndrPaufz5Sy/SYhOaS9 RgH36GbsmOq6JskdtSpBLq0768BUmrjcosgWl3REpMAZc4vvtb55WRYsrNSrqmXZ -/jHLjQkFHFdObIEcvxl+yIIwUxybMkvdxPZxnpGjF2gg6AoP7rQ5RVVHcmlkUE1B +/jHLjQkFHFdObIEcvxl+yIIwUxybMkvdxPZxnpGjF2gg6AoP7s05RVVHcmlkUE1B IERpc3RyaWJ1dGlvbiBTaWduaW5nIEtleSAzIDxpbmZvQGV1Z3JpZHBtYS5vcmc+ -iFkEExECABkFAkLTiyYECwcDAgMVAgMDFgIBAh4BAheAAAoJEMMtmcg827xx5PQA -oON2EH0dqfwNjGr1GlGyt1o5bWkzAJ0Y4QOPWaCIJFABoluX5nifjKWV9w== -=qXx1 +wlkEExECABkFAkLTiyYECwcDAgMVAgMDFgIBAh4BAheAAAoJEMMtmcg827xx5PQA +oON2EH0dqfwNjGr1GlGyt1o5bWkzAJ0Y4QOPWaCIJFABoluX5nifjKWV98bATQRk +xQC/AQgAzsH1xrhpo6SKqpcDbYpoxOujv3nonCMCW0LoFuScdZV7C2YkNThCfgpa +/pKivxGFg251fYzvqBqr5ChioiVtXzDGQ8kl6I432SE0IiqDce+v49sXruW3p01b +mIbq08VQvr2OUO2ttdF5PgrKLzswFeffpj8SUKMIr6FDn2bF2cQugJ3LdB4NKJI/ +psrM4XbZz6Ps8QTaF/6q0KmMBvYcYaXWwpR2qVwkFUx4m0lECNPO+wtr9B3F4IqX +vxnabvv2M5V4aFmFCEW9p+B0QDuv8WOD1FP1MMFslnuR6U3gLO1DdkeyWDp3Kq+5 +cNRdIjz+aW0BPMXFxq/8UJEGa1HetwARAQABzTlFVUdyaWRQTUEgRGlzdHJpYnV0 +aW9uIFNpZ25pbmcgS2V5IDQgPGluZm9AZXVncmlkcG1hLm9yZz7CwHkEEwECACMF +AmTFAL8CGwMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRCwVQBWdjQfGsEC +CADMfE5pHw5r6Vc+ogRdLcbR1PJWAvJc9JInk+uZBrtesdNxAFR5DnbSXAyGQizu +PtccqPWE3A5oymMp/GxhT79w/Ls1m1JxMKBuDpqkqKkzUfz40p5cxlOofn+ULXVG +LQ572LihkHzKS3RQKBkKZDS1O501PX/e6cVc43MnWLdIkTkCy8qHZSaMWrSrRUjq +Bp5CTplU3mSMurASdYTZ4DUiYPwI85+7sehBS037+TT6bFuT6TXPPJ/SS0WUd1ZB +EOTkZkK6qcv5rpKVOAgrkKQbddAkUJwCXl0W9SvwxICYv3yyvCQDdB737PGZmSnt +8YDANGgW8VuSx9wRks7ym9n1zsBNBGTFAL8BCAC5Ka4kFDQKLypF6uyBerzec9ER +mRv929U/XTeZ/SX4LaO1QZWU5qqPll7stj7+7ZXlT1ELEPsXqIE/mhvQ/u9b1N+t +chXvo86gybhZoEapFWoFttRv40ckB3bjJMBX299ddjF92XICfyQbyW94OOUoWdZb +OEOJIDAyGIGARPrAI8t5wBdYNWfY6sDZ457fa24zwrq48Tp+zcViXX1gz4QtzA1d +93Ejnu29h5rHU8Kgryt4KIkHULfhLMe+MW1mE8k0Nz+cViKlRBUZRGm3PBuSrKTA +qYa0XyEGnVfk0X4a/AmBsrl/dhiB2fDXvrpMFFeGm6RGSnkS8Ok2LO3e/Np5ABEB +AAHCwF8EGAECAAkFAmTFAL8CGwwACgkQsFUAVnY0Hxo6zgf+PU0tJ+m4JVt99htl +fWupOr/UNJO0mcuvA1xEzGcyv1heQfcJWBmPV9nIzuoYv8ML1mNefzpaU/dI8V40 +VK8jmlhuFMxSYmCX+5LwRph2C4W/TB5axNGF9kXebCkkfJ99DmzVQLudq/+U8lMD +twXUt8cf+e2ylIxx/uZ9u26VYsHpOkgVa4eYudlYeY7mVp7qKcigKrUBpApjestn +KfW9MyV8u/7UytoBHDrPUwq0ta9Pr5gAvWgi5I1Vdxnvl3ERoEl/QOICq1HlLjPW +3y0TbksHpqmVd5eOqVknTqqFXfQ+9n8l7X6Nv1F4aVBrFLwv+w5V0WZA1NGCAs9h +dmSSbw== +=irI7 -----END PGP PUBLIC KEY BLOCK----- diff -Nru igtf-policy-bundle-1.133/debian/watch igtf-policy-bundle-1.140/debian/watch --- igtf-policy-bundle-1.133/debian/watch 2025-03-05 12:55:59.000000000 +0000 +++ igtf-policy-bundle-1.140/debian/watch 2026-04-13 12:56:08.000000000 +0000 @@ -1,3 +1,5 @@ -version=3 -opts="pgpsigurlmangle=s/$/.asc/" \ -http://dist.eugridpma.info/distribution/igtf/current/igtf-policy-installation-bundle-(.*)\.tar\.gz +Version: 5 + +Source: http://dist.eugridpma.info/distribution/igtf/(?:(\d[.\d]*))/ +Matching-Pattern: igtf-policy-installation-bundle-(.*)@ARCHIVE_EXT@ +Pgpsigurlmangle: s/$/.asc/ diff -Nru igtf-policy-bundle-1.133/policy-igtf-classic.info igtf-policy-bundle-1.140/policy-igtf-classic.info --- igtf-policy-bundle-1.133/policy-igtf-classic.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-classic.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,153 +1,157 @@ # @(#)policy-igtf-classic.info - IGTF classic authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-classic -version = 1.133 -requires = AC-GRID-FR = 1.133, \ - seegrid-ca-2013 = 1.133, \ - TRGrid = 1.133, \ - NorduGrid-2015 = 1.133, \ - USERTrustRSACertificationAuthority = 1.133, \ - BG-ACAD-CA = 1.133, \ - eMudhra-TrustedRootCAC4 = 1.133, \ - CESNET-CA-Root = 1.133, \ - ASGCCA-2007 = 1.133, \ - PolishGrid-2019 = 1.133, \ - HellenicAcademicandResearchInstitutionsECCRootCA2015 = 1.133, \ - DFN-GridGermany-Root = 1.133, \ - DigiCertGridRootCA-Root = 1.133, \ - ResearchandEducationTrustRSARootCA = 1.133, \ - DigiCertGridCA-1G2-Classic-2015 = 1.133, \ - GEANTTCSRETrustECCRootCA5 = 1.133, \ - AC-GRID-FR-Robots = 1.133, \ - DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 = 1.133, \ - ANSPGrid = 1.133, \ - IGCA2 = 1.133, \ - IRAN-GRID-GCG-G2 = 1.133, \ - emSignClass1CAG1 = 1.133, \ - HARICATLSRSARootCA2021 = 1.133, \ - emigtfc4 = 1.133, \ - GridCanada = 1.133, \ - HARICAOVTLSECC = 1.133, \ - emigtfc5r1 = 1.133, \ - HARICAGEANTTLSRSA1 = 1.133, \ - GEANTeScienceSSLCA4 = 1.133, \ - RDIG = 1.133, \ - UKeScienceCA-2B = 1.133, \ - ArmeSFo = 1.133, \ - emigtfc5 = 1.133, \ - GEANTeScienceSSLECCCA4 = 1.133, \ - REUNA-ca = 1.133, \ - MaGrid = 1.133, \ - DCAROOT-G1 = 1.133, \ - PK-Grid-2007 = 1.133, \ - InCommon-RSA-IGTF-Server-CA-3 = 1.133, \ - HARICATLSECCRootCA2021 = 1.133, \ - USERTrustECCCertificationAuthority = 1.133, \ - DigiCertAssuredIDRootCA-Root = 1.133, \ - SRCE = 1.133, \ - UNAMgrid-ca = 1.133, \ - UKeScienceRoot-2007 = 1.133, \ - RomanianGRID = 1.133, \ - HellenicAcademicandResearchInstitutionsRootCA2015 = 1.133, \ - TRGrid2024 = 1.133, \ - GEANTTCSRETrustRSARootCA5 = 1.133, \ - CESNET-CA-4 = 1.133, \ - CERN-GridCA = 1.133, \ - MREN-CA = 1.133, \ - AC-GRID-FR-Personnels = 1.133, \ - ResearchandEducationTrustECCRootCA = 1.133, \ - SlovakGrid = 1.133, \ - PKIUNAMgrid = 1.133, \ - AC-GRID-FR-Services = 1.133, \ - KISTIv3 = 1.133, \ - DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 = 1.133, \ - emSignSSLCAG1 = 1.133, \ - emSignRootCAG1 = 1.133, \ - DZeScience = 1.133, \ - NIKHEF = 1.133, \ - CERN-Root-2 = 1.133, \ - HellasGrid-CA-2016 = 1.133, \ - DigiCertGridTrustCAG2-Classic = 1.133, \ - IHEP-2013 = 1.133, \ - KEK = 1.133, \ - HARICAOVTLSRSA = 1.133, \ - UGRID-G2 = 1.133, \ - eMudhra-TrustedRootCAC5 = 1.133, \ - HARICAGEANTTLSECC1 = 1.133, \ - SiGNET-CA = 1.133 -subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR", \ - "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013", \ - "/C=TR/O=TRGrid/CN=TR-Grid CA", \ - "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015", \ - "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority", \ - "/DC=bg/DC=acad/CN=BG.ACAD CA", \ - "/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4", \ - "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root", \ - "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury", \ - "/C=PL/O=GRID/CN=Polish Grid CA 2019", \ - "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015", \ - "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01", \ - "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA", \ - "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA", \ - "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2", \ +version = 1.140 +requires = HARICAOVTLSRSA = 1.140, \ + HellasGrid-CA-2016 = 1.140, \ + SlovakGrid = 1.140, \ + GEANTTCSRETrustRSARootCA5 = 1.140, \ + UNAMgrid-ca = 1.140, \ + UKeScienceRoot-2007 = 1.140, \ + GEANTTCSRETrustECCRootCA5 = 1.140, \ + HARICAOVTLSECC = 1.140, \ + NIKHEF = 1.140, \ + DigiCertGridRootCA-Root = 1.140, \ + REUNA-ca = 1.140, \ + UKeScienceCA-2B = 1.140, \ + USERTrustECCCertificationAuthority = 1.140, \ + DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 = 1.140, \ + PK-Grid-2007 = 1.140, \ + DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 = 1.140, \ + ArmeSFo = 1.140, \ + HARICAGEANTTLSRSA1 = 1.140, \ + RDIG = 1.140, \ + IRAN-GRID-GCG-G2 = 1.140, \ + EMOVTLSCAG2B = 1.140, \ + BG-ACAD-CA = 1.140, \ + GridCanada = 1.140, \ + emSignRootTLSCAG1 = 1.140, \ + SRCE = 1.140, \ + ANSPGridCA2 = 1.140, \ + ASGCCA-2007 = 1.140, \ + UGRID-G2 = 1.140, \ + SiGNET-CA = 1.140, \ + CESNET-CA-Root = 1.140, \ + NorduGrid-2015 = 1.140, \ + GEANTeScienceSSLECCCA4 = 1.140, \ + DZeScience = 1.140, \ + GEANTeScienceSSLCA4 = 1.140, \ + DigiCertGridTrustCAG2-Classic = 1.140, \ + DigiCertAssuredIDRootCA-Root = 1.140, \ + CERN-Root-2 = 1.140, \ + TRGrid2024 = 1.140, \ + emSignClass1CAG1 = 1.140, \ + ResearchandEducationTrustRSARootCA = 1.140, \ + emigtfc4 = 1.140, \ + PolishGrid-2019 = 1.140, \ + DCAROOT-G1 = 1.140, \ + HellenicAcademicandResearchInstitutionsECCRootCA2015 = 1.140, \ + DigiCertGridCA-1G2-Classic-2015 = 1.140, \ + CESNET-CA-5 = 1.140, \ + emigtfc5 = 1.140, \ + InCommon-RSA-IGTF-Server-CA-3 = 1.140, \ + seegrid-ca-2013 = 1.140, \ + PKIUNAMgrid = 1.140, \ + IHEP-2013 = 1.140, \ + RomanianGRID = 1.140, \ + HARICATLSRSARootCA2021 = 1.140, \ + emSignRootCAG1 = 1.140, \ + KEK2024 = 1.140, \ + emSignSSLCAG1 = 1.140, \ + MaGrid = 1.140, \ + MREN-CA = 1.140, \ + IGCA2 = 1.140, \ + EMOVTLSCAG2C = 1.140, \ + KISTIv3 = 1.140, \ + HARICATLSECCRootCA2021 = 1.140, \ + DFN-GridGermany-Root = 1.140, \ + emigtfc5r1 = 1.140, \ + eMudhra-TrustedRootCAC4 = 1.140, \ + CESNET-CA-Root2 = 1.140, \ + HellenicAcademicandResearchInstitutionsRootCA2015 = 1.140, \ + USERTrustRSACertificationAuthority = 1.140, \ + EMOVTLSCAG2A1 = 1.140, \ + REUNA-ICA-C5 = 1.140, \ + CESNET-CA-4 = 1.140, \ + eMudhra-TrustedRootCAC5 = 1.140, \ + CERN-GridCA = 1.140, \ + ResearchandEducationTrustECCRootCA = 1.140, \ + HARICAGEANTTLSECC1 = 1.140 +subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA", \ + "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016", \ + "/C=SK/O=SlovakGrid/CN=SlovakGrid CA", \ + "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5", \ + "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA", \ + "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root", \ "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5", \ - "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots", \ - "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1", \ - "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA", \ - "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2", \ - "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA", \ - "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1", \ - "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021", \ - "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4", \ - "/C=CA/O=Grid/CN=Grid Canada Certificate Authority", \ "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC", \ - "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1", \ - "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1", \ - "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4", \ - "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA", \ + "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth", \ + "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA", \ + "/C=CL/O=REUNACA/CN=REUNA Certification Authority", \ "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B", \ + "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority", \ + "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1", \ + "/C=PK/O=NCP/CN=PK-GRID-CA", \ + "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1", \ "/C=AM/O=ArmeSFo/CN=ArmeSFo CA", \ - "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5", \ + "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1", \ + "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA", \ + "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA", \ + "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B", \ + "/DC=bg/DC=acad/CN=BG.ACAD CA", \ + "/C=CA/O=Grid/CN=Grid Canada Certificate Authority", \ + "/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1", \ + "/C=HR/O=edu/OU=srce/CN=SRCE CA", \ + "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2", \ + "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury", \ + "/DC=org/DC=ugrid/CN=UGRID CA G2", \ + "/C=SI/O=SiGNET/CN=SiGNET CA", \ + "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root", \ + "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4", \ - "/C=CL/O=REUNACA/CN=REUNA Certification Authority", \ - "/C=MA/O=MaGrid/CN=MaGrid CA", \ + "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA", \ + "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4", \ + "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2", \ + "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA", \ + "/C=ch/O=CERN/CN=CERN Root Certification Authority 2", \ + "/C=TR/O=TRGrid/CN=TR-Grid CA 2024", \ + "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1", \ + "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA", \ + "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4", \ + "/C=PL/O=GRID/CN=Polish Grid CA 2019", \ "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA", \ - "/C=PK/O=NCP/CN=PK-GRID-CA", \ + "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015", \ + "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2", \ + "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5", \ + "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5", \ "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3", \ - "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021", \ - "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority", \ - "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA", \ - "/C=HR/O=edu/OU=srce/CN=SRCE CA", \ - "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA", \ - "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root", \ + "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013", \ + "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid", \ + "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority", \ "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA", \ + "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021", \ + "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1", \ + "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority2024", \ + "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1", \ + "/C=MA/O=MaGrid/CN=MaGrid CA", \ + "/DC=me/DC=ac/DC=MREN/CN=MREN-CA", \ + "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2", \ + "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C", \ + "/C=KR/O=KISTI/CN=KISTI Certification Authority", \ + "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021", \ + "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01", \ + "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1", \ + "/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4", \ + "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root 2", \ "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015", \ - "/C=TR/O=TRGrid/CN=TR-Grid CA 2024", \ - "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5", \ + "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority", \ + "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1", \ + "/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5", \ "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4", \ + "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5", \ "/DC=ch/DC=cern/CN=CERN Grid Certification Authority", \ - "/DC=me/DC=ac/DC=MREN/CN=MREN-CA", \ - "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels", \ "/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA", \ - "/C=SK/O=SlovakGrid/CN=SlovakGrid CA", \ - "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid", \ - "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services", \ - "/C=KR/O=KISTI/CN=KISTI Certification Authority", \ - "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1", \ - "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1", \ - "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1", \ - "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA", \ - "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth", \ - "/C=ch/O=CERN/CN=CERN Root Certification Authority 2", \ - "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016", \ - "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2", \ - "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority", \ - "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority", \ - "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA", \ - "/DC=org/DC=ugrid/CN=UGRID CA G2", \ - "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5", \ - "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1", \ - "/C=SI/O=SiGNET/CN=SiGNET CA" + "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" obsoletes = CyGrid-old, \ CNRS-DataGrid, \ CESNET-old, \ @@ -287,4 +291,11 @@ TSU-GE, \ HKU-CA-2, \ TERENA-eScience-SSL-CA-3, \ - MARGI + MARGI, \ + ANSPGrid, \ + AC-GRID-FR, \ + AC-GRID-FR-Personnels, \ + AC-GRID-FR-Robots, \ + AC-GRID-FR-Services, \ + TRGrid, \ + KEK diff -Nru igtf-policy-bundle-1.133/policy-igtf-dcvota.info igtf-policy-bundle-1.140/policy-igtf-dcvota.info --- igtf-policy-bundle-1.133/policy-igtf-dcvota.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-dcvota.info 2026-03-25 13:54:48.000000000 +0000 @@ -0,0 +1,6 @@ +# @(#)policy-igtf-dcvota.info - IGTF dcvota authorities +# Generated Wednesday, 25 Mar, 2026 +alias = policy-igtf-dcvota +version = 1.140 +requires = +subjectdn = diff -Nru igtf-policy-bundle-1.133/policy-igtf-discontinued.info igtf-policy-bundle-1.140/policy-igtf-discontinued.info --- igtf-policy-bundle-1.133/policy-igtf-discontinued.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-discontinued.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,6 +1,6 @@ # @(#)policy-igtf-discontinued.info - IGTF discontinued authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-discontinued -version = 1.133 +version = 1.140 requires = subjectdn = diff -Nru igtf-policy-bundle-1.133/policy-igtf-experimental.info igtf-policy-bundle-1.140/policy-igtf-experimental.info --- igtf-policy-bundle-1.133/policy-igtf-experimental.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-experimental.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,8 +1,6 @@ # @(#)policy-igtf-experimental.info - IGTF experimental authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-experimental -version = 1.133 -requires = InCommon-RSA-IGTF-Server-CA-2 = 1.133, \ - cilogon-openid = 1.133 -subjectdn = "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2", \ - "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" +version = 1.140 +requires = InCommon-RSA-IGTF-Server-CA-2 = 1.140 +subjectdn = "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2" diff -Nru igtf-policy-bundle-1.133/policy-igtf-iota.info igtf-policy-bundle-1.140/policy-igtf-iota.info --- igtf-policy-bundle-1.133/policy-igtf-iota.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-iota.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,9 +1,8 @@ # @(#)policy-igtf-iota.info - IGTF iota authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-iota -version = 1.133 -requires = RCauth-Pilot-ICA-G1 = 1.133, \ - cilogon-basic = 1.133 -subjectdn = "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA", \ - "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" -obsoletes = CERN-LCG-IOTA-CA +version = 1.140 +requires = RCauth-Pilot-ICA-G1 = 1.140 +subjectdn = "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" +obsoletes = CERN-LCG-IOTA-CA, \ + cilogon-basic diff -Nru igtf-policy-bundle-1.133/policy-igtf-mics.info igtf-policy-bundle-1.140/policy-igtf-mics.info --- igtf-policy-bundle-1.133/policy-igtf-mics.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-mics.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,23 +1,21 @@ # @(#)policy-igtf-mics.info - IGTF mics authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-mics -version = 1.133 -requires = cilogon-silver = 1.133, \ - GEANTeSciencePersonalECCCA4 = 1.133, \ - GEANTTCSAuthenticationRSACA5 = 1.133, \ - GEANTeSciencePersonalCA4 = 1.133, \ - GEANTTCSAuthenticationECCCA4B = 1.133, \ - GEANTTCSAuthenticationECCCA5 = 1.133, \ - HPCI = 1.133, \ - GEANTTCSAuthenticationRSACA4B = 1.133 -subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1", \ +version = 1.140 +requires = GEANTTCSAuthenticationRSACA5 = 1.140, \ + GEANTeSciencePersonalECCCA4 = 1.140, \ + GEANTTCSAuthenticationRSACA4B = 1.140, \ + GEANTeSciencePersonalCA4 = 1.140, \ + GEANTTCSAuthenticationECCCA4B = 1.140, \ + GEANTTCSAuthenticationECCCA5 = 1.140 +subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4", \ - "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5", \ + "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B", \ "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4", \ "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B", \ - "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5", \ - "/C=JP/O=NII/OU=HPCI/CN=HPCI CA", \ - "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" + "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" obsoletes = TACC-MICS, \ NCSA-mics, \ - TERENAeSciencePersonalCA3 + TERENAeSciencePersonalCA3, \ + HPCI, \ + cilogon-silver diff -Nru igtf-policy-bundle-1.133/policy-igtf-slcs.info igtf-policy-bundle-1.140/policy-igtf-slcs.info --- igtf-policy-bundle-1.133/policy-igtf-slcs.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-slcs.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,7 +1,7 @@ # @(#)policy-igtf-slcs.info - IGTF slcs authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-slcs -version = 1.133 +version = 1.140 requires = subjectdn = obsoletes = SWITCHslcs, \ diff -Nru igtf-policy-bundle-1.133/policy-igtf-unaccredited.info igtf-policy-bundle-1.140/policy-igtf-unaccredited.info --- igtf-policy-bundle-1.133/policy-igtf-unaccredited.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf-unaccredited.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,10 +1,10 @@ # @(#)policy-igtf-unaccredited.info - IGTF unaccredited authorities -# Generated Tuesday, 11 Feb, 2025 +# Generated Wednesday, 25 Mar, 2026 alias = policy-igtf-unaccredited -version = 1.133 -requires = nl-e-infra-zero = 1.133, \ - egee-ne-benelux-tutorial = 1.133, \ - UKPathfinder1 = 1.133 -subjectdn = "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1", \ +version = 1.140 +requires = UKPathfinder1 = 1.140, \ + egee-ne-benelux-tutorial = 1.140, \ + nl-e-infra-zero = 1.140 +subjectdn = "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1", \ "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1", \ - "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" + "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1" diff -Nru igtf-policy-bundle-1.133/policy-igtf.info igtf-policy-bundle-1.140/policy-igtf.info --- igtf-policy-bundle-1.133/policy-igtf.info 2025-02-11 20:08:28.000000000 +0000 +++ igtf-policy-bundle-1.140/policy-igtf.info 2026-03-25 13:54:48.000000000 +0000 @@ -1,87 +1,86 @@ # @(#)policy-igtf.info - all IGTF accredited authorities -# Generated Tuesday, 11 Feb, 2025 -version = 1.133 -requires = AC-GRID-FR = 1.133, \ - seegrid-ca-2013 = 1.133, \ - TRGrid = 1.133, \ - NorduGrid-2015 = 1.133, \ - USERTrustRSACertificationAuthority = 1.133, \ - BG-ACAD-CA = 1.133, \ - eMudhra-TrustedRootCAC4 = 1.133, \ - CESNET-CA-Root = 1.133, \ - ASGCCA-2007 = 1.133, \ - PolishGrid-2019 = 1.133, \ - HellenicAcademicandResearchInstitutionsECCRootCA2015 = 1.133, \ - DFN-GridGermany-Root = 1.133, \ - DigiCertGridRootCA-Root = 1.133, \ - ResearchandEducationTrustRSARootCA = 1.133, \ - DigiCertGridCA-1G2-Classic-2015 = 1.133, \ - GEANTTCSRETrustECCRootCA5 = 1.133, \ - AC-GRID-FR-Robots = 1.133, \ - DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 = 1.133, \ - ANSPGrid = 1.133, \ - IGCA2 = 1.133, \ - IRAN-GRID-GCG-G2 = 1.133, \ - emSignClass1CAG1 = 1.133, \ - HARICATLSRSARootCA2021 = 1.133, \ - emigtfc4 = 1.133, \ - GridCanada = 1.133, \ - HARICAOVTLSECC = 1.133, \ - emigtfc5r1 = 1.133, \ - HARICAGEANTTLSRSA1 = 1.133, \ - GEANTeScienceSSLCA4 = 1.133, \ - RDIG = 1.133, \ - UKeScienceCA-2B = 1.133, \ - ArmeSFo = 1.133, \ - emigtfc5 = 1.133, \ - GEANTeScienceSSLECCCA4 = 1.133, \ - REUNA-ca = 1.133, \ - MaGrid = 1.133, \ - DCAROOT-G1 = 1.133, \ - PK-Grid-2007 = 1.133, \ - InCommon-RSA-IGTF-Server-CA-3 = 1.133, \ - HARICATLSECCRootCA2021 = 1.133, \ - USERTrustECCCertificationAuthority = 1.133, \ - DigiCertAssuredIDRootCA-Root = 1.133, \ - SRCE = 1.133, \ - UNAMgrid-ca = 1.133, \ - UKeScienceRoot-2007 = 1.133, \ - RomanianGRID = 1.133, \ - HellenicAcademicandResearchInstitutionsRootCA2015 = 1.133, \ - TRGrid2024 = 1.133, \ - GEANTTCSRETrustRSARootCA5 = 1.133, \ - CESNET-CA-4 = 1.133, \ - CERN-GridCA = 1.133, \ - MREN-CA = 1.133, \ - AC-GRID-FR-Personnels = 1.133, \ - ResearchandEducationTrustECCRootCA = 1.133, \ - SlovakGrid = 1.133, \ - PKIUNAMgrid = 1.133, \ - AC-GRID-FR-Services = 1.133, \ - KISTIv3 = 1.133, \ - DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 = 1.133, \ - emSignSSLCAG1 = 1.133, \ - emSignRootCAG1 = 1.133, \ - DZeScience = 1.133, \ - NIKHEF = 1.133, \ - CERN-Root-2 = 1.133, \ - HellasGrid-CA-2016 = 1.133, \ - DigiCertGridTrustCAG2-Classic = 1.133, \ - IHEP-2013 = 1.133, \ - KEK = 1.133, \ - HARICAOVTLSRSA = 1.133, \ - UGRID-G2 = 1.133, \ - eMudhra-TrustedRootCAC5 = 1.133, \ - HARICAGEANTTLSECC1 = 1.133, \ - SiGNET-CA = 1.133cilogon-silver = 1.133, \ - GEANTeSciencePersonalECCCA4 = 1.133, \ - GEANTTCSAuthenticationRSACA5 = 1.133, \ - GEANTeSciencePersonalCA4 = 1.133, \ - GEANTTCSAuthenticationECCCA4B = 1.133, \ - GEANTTCSAuthenticationECCCA5 = 1.133, \ - HPCI = 1.133, \ - GEANTTCSAuthenticationRSACA4B = 1.133RCauth-Pilot-ICA-G1 = 1.133, \ - cilogon-basic = 1.133 +# Generated Wednesday, 25 Mar, 2026 +version = 1.140 +requires = HARICAOVTLSRSA = 1.140, \ + HellasGrid-CA-2016 = 1.140, \ + SlovakGrid = 1.140, \ + GEANTTCSRETrustRSARootCA5 = 1.140, \ + UNAMgrid-ca = 1.140, \ + UKeScienceRoot-2007 = 1.140, \ + GEANTTCSRETrustECCRootCA5 = 1.140, \ + HARICAOVTLSECC = 1.140, \ + NIKHEF = 1.140, \ + DigiCertGridRootCA-Root = 1.140, \ + REUNA-ca = 1.140, \ + UKeScienceCA-2B = 1.140, \ + USERTrustECCCertificationAuthority = 1.140, \ + DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1 = 1.140, \ + PK-Grid-2007 = 1.140, \ + DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1 = 1.140, \ + ArmeSFo = 1.140, \ + HARICAGEANTTLSRSA1 = 1.140, \ + RDIG = 1.140, \ + IRAN-GRID-GCG-G2 = 1.140, \ + EMOVTLSCAG2B = 1.140, \ + BG-ACAD-CA = 1.140, \ + GridCanada = 1.140, \ + emSignRootTLSCAG1 = 1.140, \ + SRCE = 1.140, \ + ANSPGridCA2 = 1.140, \ + ASGCCA-2007 = 1.140, \ + UGRID-G2 = 1.140, \ + SiGNET-CA = 1.140, \ + CESNET-CA-Root = 1.140, \ + NorduGrid-2015 = 1.140, \ + GEANTeScienceSSLECCCA4 = 1.140, \ + DZeScience = 1.140, \ + GEANTeScienceSSLCA4 = 1.140, \ + DigiCertGridTrustCAG2-Classic = 1.140, \ + DigiCertAssuredIDRootCA-Root = 1.140, \ + CERN-Root-2 = 1.140, \ + TRGrid2024 = 1.140, \ + emSignClass1CAG1 = 1.140, \ + ResearchandEducationTrustRSARootCA = 1.140, \ + emigtfc4 = 1.140, \ + PolishGrid-2019 = 1.140, \ + DCAROOT-G1 = 1.140, \ + HellenicAcademicandResearchInstitutionsECCRootCA2015 = 1.140, \ + DigiCertGridCA-1G2-Classic-2015 = 1.140, \ + CESNET-CA-5 = 1.140, \ + emigtfc5 = 1.140, \ + InCommon-RSA-IGTF-Server-CA-3 = 1.140, \ + seegrid-ca-2013 = 1.140, \ + PKIUNAMgrid = 1.140, \ + IHEP-2013 = 1.140, \ + RomanianGRID = 1.140, \ + HARICATLSRSARootCA2021 = 1.140, \ + emSignRootCAG1 = 1.140, \ + KEK2024 = 1.140, \ + emSignSSLCAG1 = 1.140, \ + MaGrid = 1.140, \ + MREN-CA = 1.140, \ + IGCA2 = 1.140, \ + EMOVTLSCAG2C = 1.140, \ + KISTIv3 = 1.140, \ + HARICATLSECCRootCA2021 = 1.140, \ + DFN-GridGermany-Root = 1.140, \ + emigtfc5r1 = 1.140, \ + eMudhra-TrustedRootCAC4 = 1.140, \ + CESNET-CA-Root2 = 1.140, \ + HellenicAcademicandResearchInstitutionsRootCA2015 = 1.140, \ + USERTrustRSACertificationAuthority = 1.140, \ + EMOVTLSCAG2A1 = 1.140, \ + REUNA-ICA-C5 = 1.140, \ + CESNET-CA-4 = 1.140, \ + eMudhra-TrustedRootCAC5 = 1.140, \ + CERN-GridCA = 1.140, \ + ResearchandEducationTrustECCRootCA = 1.140, \ + HARICAGEANTTLSECC1 = 1.140GEANTTCSAuthenticationRSACA5 = 1.140, \ + GEANTeSciencePersonalECCCA4 = 1.140, \ + GEANTTCSAuthenticationRSACA4B = 1.140, \ + GEANTeSciencePersonalCA4 = 1.140, \ + GEANTTCSAuthenticationECCCA4B = 1.140, \ + GEANTTCSAuthenticationECCCA5 = 1.140RCauth-Pilot-ICA-G1 = 1.140 obsoletes = CyGrid-old, \ CNRS-DataGrid, \ CESNET-old, \ @@ -222,6 +221,13 @@ HKU-CA-2, \ TERENA-eScience-SSL-CA-3, \ MARGI, \ + ANSPGrid, \ + AC-GRID-FR, \ + AC-GRID-FR-Personnels, \ + AC-GRID-FR-Robots, \ + AC-GRID-FR-Services, \ + TRGrid, \ + KEK, \ SWITCHslcs, \ ncsa-gridshib-ca, \ SWITCHslcs2011, \ @@ -237,4 +243,7 @@ TACC-MICS, \ NCSA-mics, \ TERENAeSciencePersonalCA3, \ - CERN-LCG-IOTA-CA \ No newline at end of file + HPCI, \ + cilogon-silver, \ + CERN-LCG-IOTA-CA, \ + cilogon-basic \ No newline at end of file diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.crl_url igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.crl_url --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.crl_url 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-personnels.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.info igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.info --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.info 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,11 +0,0 @@ -# -# @(#)$Id$ -alias = AC-GRID-FR-Personnels -url = http://grid-fr.renater.fr/ -email = grid-fr@renater.fr -ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr-personnels.cer -crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-personnels.crl -status = accredited:classic -version = 1.133 -sha1fp.0 = CA:F3:29:BD:77:67:9E:06:05:DB:1D:41:DF:7A:77:76:F1:78:2A:A9 -subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.pem igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.pem --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.pem 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,33 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIFwjCCBCqgAwIBAgISESEbWlKSHT/Bwe1tXK8w0TWHMA0GCSqGSIb3DQEBCwUA -MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt -RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw -MDgwMDAwWjBQMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL -DAdHUklELUZSMR4wHAYDVQQDDBVBQyBHUklELUZSIFBlcnNvbm5lbHMwggGiMA0G -CSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDWvrNF8vQ5jpSvmXPzEhBp958C43rp -DMTcQWWd0A78t1aKizc+gNAso2KQivjt1Yu/KiMSjpi85LEOKOB3OESUY6c+slfV -L5psH5bwif6zu5guiLFtd/XmRGC4wFHh1Zo8NTply0NlzaN9/bY+BQnlstexbiGe -Mm3W7AfzNmmszykgIegoOmAlk1P2Snxbk5kCO/uQlezQzNLUFB5OYE/DL4gOpONE -Xa470fCCToSUrJ2HlteU0il/8tSgBws2xENUzA/r/ZmwG6IeVHYxukK4SzOn8fFU -sLoNE0srlDz8Xgdr9XZyEFdQXJ4IsWGgGLyKsnN/jwPsZ7qkhvaDbKdml7i1S5F9 -PZf1hSgwRgx2C4NP4JZacWiG+UNTk1XM0ZiIUTjhMN+isqOHiUKRBXyg9gLw01RP -mOrA8xjzt2VjkobSdgA/9R7p+sdYTWCMsgAaPd2P5ZO1XrvRCkfUk5jKSw5zPcdz -OAj84VwO4p1cGAguc5vvH3+0b62NpUlbNCECAwEAAaOCAZ8wggGbMA4GA1UdDwEB -/wQEAwIBBjBRBgNVHSAESjBIMEYGBFUdIAAwPjA8BggrBgEFBQcCARYwaHR0cDov -L2dyaWQtZnIucG5jbi5lZHVjYXRpb24uZ291di5mci9wYy1ncmlkLWZyMBIGA1Ud -EwEB/wQIMAYBAf8CAQAwSQYDVR0fBEIwQDA+oDygOoY4aHR0cDovL2NybC5ncmlk -LWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvYWMtZ3JpZC1mci5jcmwwgZYGCCsG -AQUFBwEBBIGJMIGGMEQGCCsGAQUFBzAChjhodHRwOi8vY2VyLmdyaWQtZnIucG5j -bi5lZHVjYXRpb24uZ291di5mci9hYy1ncmlkLWZyLmNlcjA+BggrBgEFBQcwAYYy -aHR0cDovL29jc3AuZ3JpZC1mci5wbmNuLmVkdWNhdGlvbi5nb3V2LmZyL2dyaWQt -ZnIwHQYDVR0OBBYEFN49xvEGIjeZn88iCJUA5wHioLwQMB8GA1UdIwQYMBaAFKoM -1rz52WU9cIpRMCCPTP7NYLnjMA0GCSqGSIb3DQEBCwUAA4IBgQBxa53DK6bHVXcv -5Uo+QIgpi43ybbXlSY/7a2fFiMZLRiJ/gpm9qicZUAfNbXIG8eY7i6SCIIFa/on4 -0CnZjPeFy7Hi4HZwFpT4Mdu6G5yAV94k70sWqi5Vfdcv0PO37GI0QyxqtzTCB07n -JhhE/uyYuwLryXXOUq/r4z2O1N4OZyeALiA/ojO0oQxzuULoveFyasd05tmmPD+r -TEePaoly889oH61GbOvYx7syO2AoViVGa2kZX5qUqfVhiYa3vd1uhU8UGqs8iHWW -f8BaCawV7GpJ8yx4+rlLHT5nzLcrg8+c8tGHuoFLgPdS3WuJXNrQjtwfd95u/Rx0 -mQUm5QDZgIdYSJmYYt6fVyqxRrszSOcS/6qsVeethyqP0ni5jsQjxiWz1jb2cfiT -Er1nrK8Z3F4wm+pLovR5em7ck1BayNUmcXonsfHcUZVb/skfLxxVu7znPI8epMz+ -5EgHvw2trURiay3DlgXy6uj5tp/PbG6V+UtgH5Iso9WzByLXcuk= ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.signing_policy igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.signing_policy --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Personnels.signing_policy 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Personnels.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,5 +0,0 @@ -# @(#)$Id$ -# Root -access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels' -pos_rights globus CA:sign -cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" "/O=GRID-FR/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.crl_url igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.crl_url --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.crl_url 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-robots.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.info igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.info --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.info 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,11 +0,0 @@ -# -# @(#)$Id$ -alias = AC-GRID-FR-Robots -url = http://grid-fr.renater.fr/ -email = grid-fr@renater.fr -ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr-robots.cer -crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-robots.crl -status = accredited:classic -version = 1.133 -sha1fp.0 = 4F:F6:0F:C9:6B:74:29:E5:47:2A:A5:6F:6D:16:0B:08:E1:A9:F3:B5 -subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.pem igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.pem --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.pem 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,33 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIFvjCCBCagAwIBAgISESFAl7trMdJXz5ZYSEYjPuxtMA0GCSqGSIb3DQEBCwUA -MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt -RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw -MDgwMDAwWjBMMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL -DAdHUklELUZSMRowGAYDVQQDDBFBQyBHUklELUZSIFJvYm90czCCAaIwDQYJKoZI -hvcNAQEBBQADggGPADCCAYoCggGBAL/+wRKB3L7pCr2BZX0phbCRLZLw3nCLwd11 -mZf1X+NLOQFdvENc0fHpesvBBidtjk+aBzUTkjqIX2MV0UnQMn82mww1HcdGFEOt -Gwa4w9GRDYHdkzoqMs41S7IQ055OWbJlJKKKf0DIGU8qYCkeru7C6X9+29TvAkOv -8d3o6OyJhBaUOHoi1jOzI63uAPsMVihMBiAClLVj+lpZdE+ugdGkRlgjEmdLuvmP -JSE8xgv8F+JwiY89VSzcIoV1hSlV9o8bWrgRBat7EHafF69Y+DyQ6FA7w/enqLMI -xsx1ZqTuabN+DHc8/yq8rsGiu9RMSJmhPhyagbu0BgGA0kpd6okBnvLrZGmi3+M7 -UsAUycr2t8Gf+RddcE4amfz8q8GewhkGsHRiH7aghW2hajLWBkKlvNZcKN57/I/N -wfNAa3KS7qECgjQ4uFhvFamkqJz39NY/TR5F8HxWR2Ul37HGOmoRPYnUlIKQNUiH -y9UXwiNCZ9dHjGLD8ReII3n3UoT+XwIDAQABo4IBnzCCAZswDgYDVR0PAQH/BAQD -AgEGMFEGA1UdIARKMEgwRgYEVR0gADA+MDwGCCsGAQUFBwIBFjBodHRwOi8vZ3Jp -ZC1mci5wbmNuLmVkdWNhdGlvbi5nb3V2LmZyL3BjLWdyaWQtZnIwEgYDVR0TAQH/ -BAgwBgEB/wIBADBJBgNVHR8EQjBAMD6gPKA6hjhodHRwOi8vY3JsLmdyaWQtZnIu -cG5jbi5lZHVjYXRpb24uZ291di5mci9hYy1ncmlkLWZyLmNybDCBlgYIKwYBBQUH -AQEEgYkwgYYwRAYIKwYBBQUHMAKGOGh0dHA6Ly9jZXIuZ3JpZC1mci5wbmNuLmVk -dWNhdGlvbi5nb3V2LmZyL2FjLWdyaWQtZnIuY2VyMD4GCCsGAQUFBzABhjJodHRw -Oi8vb2NzcC5ncmlkLWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvZ3JpZC1mcjAd -BgNVHQ4EFgQU92A8S+yen2ovurd7hApcKJ21uGYwHwYDVR0jBBgwFoAUqgzWvPnZ -ZT1wilEwII9M/s1gueMwDQYJKoZIhvcNAQELBQADggGBADXYjAaOvjIP/dbFquB3 -NqNKG4iz0gCXJXPco/rLfGww2C01zVFBMqvIWhMqPXRH98mNO/HSoq/NiyDh8EIT -hfpKdo1+//rWARcqAolOK8/2u+saKJj/GaYL5SNjKW+apLxF6Cg7TZvPvee+zBw3 -txpHtkghmrBs/LPiiDt9fr4fPSeffS/BYrOHoErm1in1LV3Zkv2KWg30XtZ+xc3b -CmWCpyXrE4hLjzDp6r7e08Iz5/t0K5kKKiXxVF4QSTTYzPtPZsher7SOBfFsB6yE -83QQNhs83ICJ/Ws96LYc1De/wws5REFQUkXWOOvT4bbSCa8JbS/eztM1wWfTY8y7 -dbkmP9B4tDEgfZghXIkNGxZF1/d6LrEoegtN0qCdlTBlEZcdO9Q2hN4T16fGSYzz -ans/sAwE7MG58tNljYNipEgltzxYbe2MyUYDBQcBn5eFbxliJAV7qQupZbwdWyXJ -h2ZRUAyxdNAh+U34FlMN3mRfoMLHgWFE6WnkCIaVOEcOsg== ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.signing_policy igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.signing_policy --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Robots.signing_policy 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Robots.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,5 +0,0 @@ -# @(#)$Id$ -# Root -access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots' -pos_rights globus CA:sign -cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" "/O=GRID-FR/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.crl_url igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.crl_url --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.crl_url 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-services.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.info igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.info --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.info 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,11 +0,0 @@ -# -# @(#)$Id$ -alias = AC-GRID-FR-Services -url = http://grid-fr.renater.fr/ -email = grid-fr@renater.fr -ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr-services.cer -crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr-services.crl -status = accredited:classic -version = 1.133 -sha1fp.0 = 98:7B:6B:9F:E1:64:75:02:F1:DD:5A:DB:29:74:A5:7F:9D:57:94:B5 -subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.pem igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.pem --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.pem 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,33 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIFwDCCBCigAwIBAgISESGxMY3ZpgPWXUE/0bGX9r+ZMA0GCSqGSIb3DQEBCwUA -MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt -RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw -MDgwMDAwWjBOMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL -DAdHUklELUZSMRwwGgYDVQQDDBNBQyBHUklELUZSIFNlcnZpY2VzMIIBojANBgkq -hkiG9w0BAQEFAAOCAY8AMIIBigKCAYEA7SW/hkgx3e0dZygJyUmm2tzr6r9yLlNZ -zVZ4kIga7MI5+uUzBTlqj5V5mrgQJu3+8/K0frrxETl4Vt7kkQEY+7h+2jgY8ED0 -zYWvfEfqTgqVnoFv96KDRfhy19W9vzx2mXuwZkPUVwiC4mFTtdmyxQ1IEyO8E3IC -2c0iJm9CCdJBQBt9kvuRbEksjmPCPtmIeS1RUYe2YSewJgzkSmyPTOjfG13/u8xG -xBvPOSoyPceE2+V6/GHYXwML5KZ4RVjgm2Iy/d2oWQqPLdwXG4PLjD37WKd6Sfsr -RsuJIBC6mMJAQRBy7V1DjgOiq4MkG+BktVrzVE2XZiF/QNyooM2TmHql6P/Pd8nU -Y4bJKY/G/JfKG1hmBOLiiUANmbu+0qruyEEQoBTErQw+0e616T6KclSJA03CuuQT -YM8JISYwL6pWPtheZFGj3nB6QkTx9Ym+Nq5Q4nvFe76r2NZF6PDNEMkoUxSRMDEk -obzYmRMAmElimK7V3towUBMD7fbuGyy/AgMBAAGjggGfMIIBmzAOBgNVHQ8BAf8E -BAMCAQYwUQYDVR0gBEowSDBGBgRVHSAAMD4wPAYIKwYBBQUHAgEWMGh0dHA6Ly9n -cmlkLWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvcGMtZ3JpZC1mcjASBgNVHRMB -Af8ECDAGAQH/AgEAMEkGA1UdHwRCMEAwPqA8oDqGOGh0dHA6Ly9jcmwuZ3JpZC1m -ci5wbmNuLmVkdWNhdGlvbi5nb3V2LmZyL2FjLWdyaWQtZnIuY3JsMIGWBggrBgEF -BQcBAQSBiTCBhjBEBggrBgEFBQcwAoY4aHR0cDovL2Nlci5ncmlkLWZyLnBuY24u -ZWR1Y2F0aW9uLmdvdXYuZnIvYWMtZ3JpZC1mci5jZXIwPgYIKwYBBQUHMAGGMmh0 -dHA6Ly9vY3NwLmdyaWQtZnIucG5jbi5lZHVjYXRpb24uZ291di5mci9ncmlkLWZy -MB0GA1UdDgQWBBTVeoDzRACxUnt+aN4TNqW0USLf6zAfBgNVHSMEGDAWgBSqDNa8 -+dllPXCKUTAgj0z+zWC54zANBgkqhkiG9w0BAQsFAAOCAYEAXY6YlQPTvwXjhM+i -tpoy17NrZ7r0RWkT0LeeDI6dBemQeQzeJ6JkxQAd5yxLhTvsc+BdYDvHSFV6NPnP -KfuPsh1GdM6MjyvOeBN35uwCTgSG/Z7csiY3DNp3h0rXf/uBopWu1FB2ILpDVdgn -d2mxGNkFNs3ZwSGIAv+SJi4MR1/279OUIQCTnjz7wgXbgiq0DyzgQuN4Mn3yQ1o2 -CfmsOmHkAalHre5MFRveg2C4Xe0YXO+XNR6tI3XMzmV2awhtqp8yZUpRhthcBQTk -QcIrifdWiPGYtLiLzjwYoqcXO1FXbQ29H+Bmpa77beii0cg7GJk9BITJb/oIDZ0k -BHjCpFyzkTZ2jHBWyFWgF+2BYD63CW/qrVj4TJEPFw1zruJ6OhN42FVPzwe/44Fn -D/iUz34tRkzM1RCklLT9vKeFdbjntYNqSoQYmx/6jkrbsGpFIyk4tQOC42eH3r9O -8AonjVA2EZ2EhUM/tZKiLvbC4muWiIvBWFb7+9MkstgKiePb ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.signing_policy igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.signing_policy --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR-Services.signing_policy 2025-02-11 20:07:48.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR-Services.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,5 +0,0 @@ -# @(#)$Id$ -# Root -access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services' -pos_rights globus CA:sign -cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" "/O=GRID-FR/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.crl_url igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.crl_url --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.crl_url 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.info igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.info --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.info 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,11 +0,0 @@ -# -# @(#)$Id$ -alias = AC-GRID-FR -url = http://grid-fr.renater.fr/ -email = grid-fr@renater.fr -ca_url = http://cer.grid-fr.pncn.education.gouv.fr/ac-grid-fr.cer -crl_url = http://crl.grid-fr.pncn.education.gouv.fr/ac-grid-fr.crl -status = accredited:classic -version = 1.133 -sha1fp.0 = 38:9D:99:0D:6A:6E:6C:68:AC:B5:9F:F6:03:5D:38:1C:A7:40:29:60 -subjectdn = "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.namespaces igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.namespaces --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.namespaces 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,28 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)AC-GRID-FR.signing_policy.namespaces -# CA alias : AC-GRID-FR -# subord_of: -# subjectDN: /C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR -# hash : AC-GRID-FR.signing_policy -# (generated automatically from AC-GRID-FR.signing_policy) -# -TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" \ - PERMIT Subject "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" - -TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" \ - PERMIT Subject "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" - -TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" \ - PERMIT Subject "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" - -TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" \ - PERMIT Subject "/O=GRID-FR/.*" - -TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" \ - PERMIT Subject "/O=GRID-FR/.*" - -TO Issuer "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services" \ - PERMIT Subject "/O=GRID-FR/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.pem igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.pem --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.pem 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,28 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIEzjCCAzagAwIBAgISESHcZGpjVbhv3LcwHBxmFWKhMA0GCSqGSIb3DQEBCwUA -MEUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQKDAZNRU5FU1IxEDAOBgNVBAsMB0dSSUQt -RlIxEzARBgNVBAMMCkFDIEdSSUQtRlIwHhcNMTYwOTMwMDgwMDAwWhcNNDAwOTMw -MDgwMDAwWjBFMQswCQYDVQQGEwJGUjEPMA0GA1UECgwGTUVORVNSMRAwDgYDVQQL -DAdHUklELUZSMRMwEQYDVQQDDApBQyBHUklELUZSMIIBojANBgkqhkiG9w0BAQEF -AAOCAY8AMIIBigKCAYEAywcrhCkF87S7e/Sfc0S+QGS4ED9EuYvoQj8KiWlyz9UF -nccNtjaxnlJbaGU6myNreeEEbt+QdydQ/vkPQd2gEhoxirz6VDJgRg2i56Zw/JL9 -FVcmDgKG6t7Ap9/NB3MobXWPd7yQu7SIfnd3BnLW87tOdILpiODZNOWeh6Qg1Fgn -aFHRjVPN6ugU1qbW44sPDv0yFhNRfnsDomVOewRg46fxv8tah+lIYsVulGYVhmkI -AgNs9YMTclukxPL5YOFgeY+3A+G/1NwKmteFqBIQRcaF1UbHrSsn6H5cIdsEJ1NT -IBPYuDGD/SkH5dFpOeyZ+RLxCaoI4W+dVyYhVealdrtmI2XQL7lLWLTHJzZqRBcA -gc60J2bjZl3HwxFE/QKW5f67zLkupFPO61OWeAl+pwIIE4Xo6z0ubNrLg5MqiO7G -7YOPocSlkBMIv+OzhrzMxsZpjSaLm32/nGyj0T+XQwUN4gK87VkHa0lz+qU6TTG0 -bggGOK72rcXdGZWlzGfzAgMBAAGjgbcwgbQwDgYDVR0PAQH/BAQDAgEGMA8GA1Ud -EwEB/wQFMAMBAf8wUQYDVR0gBEowSDBGBgRVHSAAMD4wPAYIKwYBBQUHAgEWMGh0 -dHA6Ly9ncmlkLWZyLnBuY24uZWR1Y2F0aW9uLmdvdXYuZnIvcGMtZ3JpZC1mcjAd -BgNVHQ4EFgQUqgzWvPnZZT1wilEwII9M/s1gueMwHwYDVR0jBBgwFoAUqgzWvPnZ -ZT1wilEwII9M/s1gueMwDQYJKoZIhvcNAQELBQADggGBAIGprfsrGbphQnPMyshh -SOB+Q/hLV3vSyT52kSuifHMHkoLA61cJT/Lrp5Vb2yKi7SWzbWrCD4dNsbTAt838 -7WZUVeSkvvqJmDeMI/Jj4LVMVSnLsxFHwrphw1KiEen2kZL8BmbTRW1x3UnuF7Dx -Evr/Um7O+gZFg0SHCVCeCpYYROLZOFre98lvvYRn2vixKPSXxDkfaeW4B91SD3is -qMW8ATtq3Wp5ZOGRlMzCEEt2OmLnSYldkjb/I1Noi3A9Uzwuxxm9vDfG291uI6ks -wMpYrwVXjoUZWZ1FSf766SBtAzLPYjcpmJwRvTIxNyMWedZCMbkKhRL9z1ZhEMbR -chLvh3mnrDdFbUoCCQ4ZqmcgYIgw3+JzIf3vRszPpJirJ0ZoZKrBs4QRDdlFZtON -kBA7U1h+lAzYSExpZPoF8m7meKtL9oanlJ66XLGv0yg6N7oL1mvPkR/QiLSrOeRI -+yS8kr+zh4fpr9gRJUQkxA+xGSiGUk9DZwK0TA/3WICj7w== ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.signing_policy igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.signing_policy --- igtf-policy-bundle-1.133/src/accredited/AC-GRID-FR.signing_policy 2025-02-11 20:07:47.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/AC-GRID-FR.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,5 +0,0 @@ -# @(#)$Id$ -# Root -access_id_CA X509 '/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR' -pos_rights globus CA:sign -cond_subjects globus '"/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR" "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Personnels" "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Robots" "/C=FR/O=MENESR/OU=GRID-FR/CN=AC GRID-FR Services"' diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGrid.crl_url igtf-policy-bundle-1.140/src/accredited/ANSPGrid.crl_url --- igtf-policy-bundle-1.133/src/accredited/ANSPGrid.crl_url 2025-02-11 20:07:49.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGrid.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://gridca.ansp.br/media/ca/anspca.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGrid.info igtf-policy-bundle-1.140/src/accredited/ANSPGrid.info --- igtf-policy-bundle-1.133/src/accredited/ANSPGrid.info 2025-02-11 20:07:49.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGrid.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,9 +0,0 @@ -alias = ANSPGrid -ca_url = http://gridca.ansp.br/media/ca/anspca.pem -crl_url = http://gridca.ansp.br/media/ca/anspca.crl -email = gridca@ansp.br -status = accredited:classic -url = http://gridca.ansp.br -version = 1.133 -sha1fp.0 = EF:7A:26:F8:95:46:0E:FD:88:D3:B1:1D:AA:13:D6:1B:C5:5D:11:6A -subjectdn = "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGrid.namespaces igtf-policy-bundle-1.140/src/accredited/ANSPGrid.namespaces --- igtf-policy-bundle-1.133/src/accredited/ANSPGrid.namespaces 2025-02-11 20:07:49.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGrid.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,13 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)126f0acf.namespaces -# CA alias : ANSPGrid CA -# subord_of: -# subjectDN: /C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA -# hash : 126f0acf -# (generated automatically from 126f0acf.signing_policy) -# -TO Issuer "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA" \ - PERMIT Subject "/C=BR/O=ANSP/OU=ANSPGrid CA/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGrid.pem igtf-policy-bundle-1.140/src/accredited/ANSPGrid.pem --- igtf-policy-bundle-1.133/src/accredited/ANSPGrid.pem 2025-02-11 20:07:49.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGrid.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,32 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIFdjCCA16gAwIBAgIJANNG8jP8vlYRMA0GCSqGSIb3DQEBCwUAMEgxCzAJBgNV -BAYTAkJSMQ0wCwYDVQQKEwRBTlNQMRQwEgYDVQQLEwtBTlNQR3JpZCBDQTEUMBIG -A1UEAxMLQU5TUEdyaWQgQ0EwHhcNMTEwODI1MTgxNTEwWhcNMzEwNzI1MTgxNTEw -WjBIMQswCQYDVQQGEwJCUjENMAsGA1UEChMEQU5TUDEUMBIGA1UECxMLQU5TUEdy -aWQgQ0ExFDASBgNVBAMTC0FOU1BHcmlkIENBMIICIjANBgkqhkiG9w0BAQEFAAOC -Ag8AMIICCgKCAgEAynEsbldOTIlPCyBSBTwMw2jE+uBvwFBKjyzYR94wefBactKx -FsoLqgclOiv17TAUqaIlVQx+diunsEzDcdoeqyILlR3IDRyj6OEuS6wQ2nZb1g6j -CAEV2oBbtIdHAkL00DD5RxQBSKsSgEbkObv1rJcRkbBeNZyHdE9nswNAgcO48MwI -aBG8JvunmkeATUh4hY+c5t5euj8BYI1ouCNu2bxkJ8kVKYkvrkpI972m/vzMx9Sf -sdGobfnmaUah2Wq3L6spdxU/Dojr8aJHVxnPLp8y4atdSqlGCyriPTlnC2hULqxn -rahUIDloQXiYoYC2aLb66vxaRTMjV3EmpiqgXyl04AEkb+hAwb//kXq+wMNoruDo -z6zhAI7jyQFUve5PMcDiXAyZx5R4oSp1I2iwOjxR2oKnhML0m1iSrIvHC7Vzc16g -cHV7uicA9Tu0NW7dxezEY1HQwKZT3qO2BmOgnQ2UHSINJaUgNB//2HD8VyBbVxOD -5J5pkaRro+IMsZuHB3jMwbK4tWG61o9DQmEhmk1DAXwQ0r9mnKAKsSZpS7PQCIBq -jQWpnXLpZ3FlKvKjPGF318KRUKuP0exGMNJSSDVkxdP4hD/jT4t2bxIp23brYIKS -SuhTM+748YglS3UbERujx0d3LpXNYFO+KIGlbEWxJaJc12ikLaCJ9yhwIMUCAwEA -AaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE -FBpe6dIaAhb1EcmMPe2Tn8CiuTThMB8GA1UdIwQYMBaAFBpe6dIaAhb1EcmMPe2T -n8CiuTThMA0GCSqGSIb3DQEBCwUAA4ICAQAfjEHWhdo09DAz/R2HEFta3pdqTbdf -6sX8vsWf+nEZSqWY4KR3rFgeQn/g5GodpyYwiVKO0B1bO5BefRGf/rV6yoL2ypWV -5wlmQAFSWa4OlUt9NEbBVW66IwHGoiQbIRD4soD5vkor6hRuvCzbEP6aqMOeRQbU -+LfYtoAP40F7i0/+w8h04GFlLYmQ9SuSTJtRO7IHQf9+qwcVYsNMe2h6FSFbHnWp -QPcZjnWuNMLAWCOs/qTY7ASqeVSf4MMs5U5Yse9KekdwzpW13R6VjVf8aK8cIrgL -ImPtI4aO/LSo6jXuV5e0pXqdN1PrDQ9ewpJedtwvhe5oQtlskiS7YVdtKcPAAKOn -7Vy4HDRacrFVGbXx8poJ3/sw6JDts/cghi01HsCt6+yIy5WxnfRh1yxBBHzvM6qZ -1TCbOqbbLf1yFjwkvXUTdb4YhEtJ7hnHn9uGLF+pLYTvIABWT4uenKy3rwkU0lip -adLCxqmBcBua7pnHS+6xyOn4D4+8egii8yBioOqP2nSfCIOUNunq+15otbj7akBI -DRwOKi84DdpWFC+kAYoDvxUQ7UFyjj+aiBxVHxUaLZGxJaEnRL9Z7Oxl6nDAl+v9 -ZyUlaEuJ/nWArIVO7JurTrJXxzeFgwZ4kAhutUN7L6YSdO6xILQENX9VNpCvWp3w -QyqzsDUQCUW+wA== ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGrid.signing_policy igtf-policy-bundle-1.140/src/accredited/ANSPGrid.signing_policy --- igtf-policy-bundle-1.133/src/accredited/ANSPGrid.signing_policy 2025-02-11 20:07:49.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGrid.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,3 +0,0 @@ - access_id_CA X509 '/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA' - pos_rights globus CA:sign - cond_subjects globus '"/C=BR/O=ANSP/OU=ANSPGrid CA/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.crl_url igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.crl_url --- igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.crl_url 2026-03-25 13:54:33.000000000 +0000 @@ -0,0 +1 @@ +http://gridca.ansp.br/media/ca/anspca2.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.info igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.info --- igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.info 2026-03-25 13:54:33.000000000 +0000 @@ -0,0 +1,9 @@ +alias = ANSPGridCA2 +ca_url = http://gridca.ansp.br/media/ca/anspca2.pem +crl_url = http://gridca.ansp.br/media/ca/anspca2.crl +email = gridca@ansp.br +status = accredited:classic +url = http://gridca.ansp.br +version = 1.140 +sha1fp.0 = 7F:76:23:F4:80:7E:85:DD:76:8F:A3:BF:5B:88:1F:38:37:55:41:66 +subjectdn = "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2" diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.namespaces igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.namespaces --- igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.namespaces 2026-03-25 13:54:33.000000000 +0000 @@ -0,0 +1,13 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)ANSPGridCA2.signing_policy.namespaces +# CA alias : ANSPGridCA2 +# subord_of: +# subjectDN: /C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2 +# hash : ANSPGridCA2.signing_policy +# (generated automatically from ANSPGridCA2.signing_policy) +# +TO Issuer "/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2" \ + PERMIT Subject "/C=BR/O=ANSP/OU=ANSPGrid CA/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.pem igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.pem --- igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.pem 2026-03-25 13:54:33.000000000 +0000 @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFejCCA2KgAwIBAgIJAOdHr5SOjnckMA0GCSqGSIb3DQEBCwUAMEoxCzAJBgNV +BAYTAkJSMQ0wCwYDVQQKEwRBTlNQMRQwEgYDVQQLEwtBTlNQR3JpZCBDQTEWMBQG +A1UEAxMNQU5TUEdyaWQgQ0EgMjAeFw0yNTAyMjAyMTAxNDhaFw0zNTAyMTgyMTAx +NDhaMEoxCzAJBgNVBAYTAkJSMQ0wCwYDVQQKEwRBTlNQMRQwEgYDVQQLEwtBTlNQ +R3JpZCBDQTEWMBQGA1UEAxMNQU5TUEdyaWQgQ0EgMjCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAKM2fLjGcZSIksgAYVL5g3b6qlhxnP5o4+bwXCebY+W1 +wl8iFGNVpFrvh1h55/JzhIJV5osbGFG7b0YEmRw9zU/Myk2IpHTJzyjxnoBCPvDQ +fxxClrRzzPAVRYzcFVHsyLVNdyt2W6Dhwu5AAqhIdd/kzjUMQAKsG5Sj10HFPvt/ +x1I0cMDRac4CmvCVgZYtLu5skLnoD3tI3ojX2HGJQ9aXdZt/3c8x6oDZdjCTmp5A +1w0KJ4si11ir83DUzeJeQkXq4ZI1Wkq8PPHVswiU8plPjxQYvmkA9EoOsSwmwURh +bCBQkxMybEZ2kjsdohssrT6Vew521DS0t/SsEnrKv2jDC4XOaL7wlgLbAAX3CH20 +K9bNtsYNsXp6i1ISpAi4H4sHHdnfLzBxbievLot+awJ4X5e9LcYszlD277BZgIbE +gsHkvIJws5CQDy9WdW5I5J3hqIxcM0HWj0tA9uXFYg1BKZI3IZfPnPbnF5CAQoCw +MAfLFvj1TqESES+XEuolrpiUzFE+sA+p9GKQKMQA3yi/QPXOFhzE4crZTSA3fTly +sXuKw3vRQB1cNDNwJ+slta4lMIjaYqujUObMR/Dl4SDS1S/P3sHme7ALh+Feh7MG +b6rnBlIAihvxeW2DfPl1DRHmb5FclzSpIHJRDdIunfDxND+o7JWxU0jRqOq00j8z +AgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1Ud +DgQWBBQVzcda9e4cRVzbvVEYaqG9L7dfdTAfBgNVHSMEGDAWgBQVzcda9e4cRVzb +vVEYaqG9L7dfdTANBgkqhkiG9w0BAQsFAAOCAgEAOiK87/CIswHUXoWJhRJPsFKh +5ywi6rcVKvj7ukKE/NQ+qf0Qgjn1Yx/CMTd38BylX+HfCoAG3uaFXDdcYgy22Mi+ +U8mLulKr4qWIEt5+cveEInhvx8kM7X7/jwRh9p4Xdm7JRJUr0zrTscKdjgCiyg3N +a3x4MGaGCFg90cSXdX3SmVkt9y5eO0ef+J00Htdci/pU3v1ayBg/niWhLt+TM21l +DutDdznWO1fBxzvcuQTzbMBDfSqsKLD0GRl2JKm2tj8aia+/bSD8DM8NdNj9DS0h +wNGvMTwatY4TKn9l4YShSaYfWSn2UyOr2Auf0PL/vfWUl6on8EuYi1Q8aef6pfYy ++0wFwZZ3Jn8MfNv7dLTdAf4UEGsTysslYJeRgvLh9si52wq6vj2kvZHOzPExB7Fm +ZJUXdSwvXMc+svufF5HZXOQ2MfU7VlUcqnxC7LiIae7q7igUcHsLgcYHzAMXp6P2 +w2df8HsyiMpkGyww5sozB9E6GpgUM/R0Ua/V+Z/GTXWB9sE6AzPezdHV00OK3Y4H +HbfZlhMjHJwBGsJjvh4xTG35qVjbnCNOnGU0i7oguZRoXa1yAjRybCZM9ZbmeQN5 +ZlxLa46e30DJTP82g1llBn/CXnNQD7vGJgcBPUeLxnkeAuc3evxZCeGLEGDJM5kN +8ud8nDBaxFT/F10rg4s= +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.signing_policy igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.signing_policy --- igtf-policy-bundle-1.133/src/accredited/ANSPGridCA2.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ANSPGridCA2.signing_policy 2026-03-25 13:54:33.000000000 +0000 @@ -0,0 +1,4 @@ +# @(#)ANSPGridCA2 EACL 20250224 + access_id_CA X509 '/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2' + pos_rights globus CA:sign + cond_subjects globus '"/C=BR/O=ANSP/OU=ANSPGrid CA/CN=ANSPGrid CA 2" "/C=BR/O=ANSP/OU=ANSPGrid CA/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/ASGCCA-2007.info igtf-policy-bundle-1.140/src/accredited/ASGCCA-2007.info --- igtf-policy-bundle-1.133/src/accredited/ASGCCA-2007.info 2025-02-11 20:07:49.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ASGCCA-2007.info 2026-03-25 13:54:33.000000000 +0000 @@ -3,6 +3,6 @@ email = ca@lists.grid.sinica.edu.tw status = accredited:classic url = http://ca.grid.sinica.edu.tw/ -version = 1.133 +version = 1.140 sha1fp.0 = 0E:9E:58:74:61:4C:12:16:20:AC:34:07:CD:AD:E9:81:3C:08:61:95 subjectdn = "/C=TW/O=AS/CN=Academia Sinica Grid Computing Certification Authority Mercury" diff -Nru igtf-policy-bundle-1.133/src/accredited/ArmeSFo.info igtf-policy-bundle-1.140/src/accredited/ArmeSFo.info --- igtf-policy-bundle-1.133/src/accredited/ArmeSFo.info 2025-02-11 20:07:50.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ArmeSFo.info 2026-03-25 13:54:33.000000000 +0000 @@ -7,6 +7,6 @@ crl_url = http://file.escience.am/crl.pem;https://escience.am/file/crl.pem url = http://escience.am/ status = accredited:classic -version = 1.133 -sha1fp.0 = 35:F7:6C:1F:35:1D:8C:38:59:E9:BF:ED:9D:A6:72:C6:5A:51:97:80 +version = 1.140 +sha1fp.0 = F6:A2:E6:22:77:70:7E:2B:24:86:71:DA:AB:63:43:89:7B:14:8D:B3 subjectdn = "/C=AM/O=ArmeSFo/CN=ArmeSFo CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/ArmeSFo.pem igtf-policy-bundle-1.140/src/accredited/ArmeSFo.pem --- igtf-policy-bundle-1.133/src/accredited/ArmeSFo.pem 2025-02-11 20:07:50.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ArmeSFo.pem 2026-03-25 13:54:33.000000000 +0000 @@ -1,20 +1,20 @@ -----BEGIN CERTIFICATE----- -MIIDTDCCAjSgAwIBAgIHZyglcSFmcTANBgkqhkiG9w0BAQUFADA0MQswCQYDVQQG -EwJBTTEQMA4GA1UEChMHQXJtZVNGbzETMBEGA1UEAxMKQXJtZVNGbyBDQTAeFw0w -MzEyMDEyMzI5MjFaFw0zMDEyMDEyMzI5MjFaMDQxCzAJBgNVBAYTAkFNMRAwDgYD -VQQKEwdBcm1lU0ZvMRMwEQYDVQQDEwpBcm1lU0ZvIENBMIIBIjANBgkqhkiG9w0B -AQEFAAOCAQ8AMIIBCgKCAQEAtSzCNZqZokRtnR0nzki6INFx5dbTAyh4JPGgfNB0 -iDRKWHekm5vkdnEQeclGsGRb13+3U0OyGoypiD1x07d8TedU1HojmfgR4/xp6ibE -j6KfdvDf6wWsu3o7tLXoPHYWadu8NsU/5h715Ox2A7bWP/gl6Spxxc0xaKBCXI8T -5ns7KCSEPpA/Gc27vjrQJ5LgsCv7MjTE1JpL5ZSE9v248vcVLWTCi+H2YKuSDGfe -AMn81GSt1ehHLB0547kdqdhVpcmeqporN4+uISRycqS+Vypu63LzYEky+xb0/Ld5 -auTEgxTMa+FZB9NlgHkAdYPXRm5DiHfvJsZ1a6Dx/wfrkQIDAQABo2MwYTAPBgNV -HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQU8ZcKnrnf9cfc -lU9YZLg/T17sblcwHwYDVR0jBBgwFoAU8ZcKnrnf9cfclU9YZLg/T17sblcwDQYJ -KoZIhvcNAQEFBQADggEBAGnUL4DBYqUdXxTs2KkiqVzqZ8wgnUI68e4HWLlvQsdw -Tgk1BoisRBqYXuN80DlBx1V4UUMPYtR3Bvqzs9jSM4amGliEFZO3VOLShd2WtP8v -9tFQxHeqVKjpTavn3K+pN0g6rP/pBYrRYQgXFedLDYlassVNai0ElPIdALt5nvmC -MTgZX/A7yIrq6qYN1qpHZf5x+k/JX5nROROb0QsS+eOLlwIuZ6PgPnvGz0GXlQx2 -30XYwW9bAcT5wSxpSnHIAprqr6i65K5xn/1BixpFXi1yuOxkoYO3q3/GTLHDv1Ie -u8kRergGobhtpZIQ6CL3hfVV9N1eOr91fuS3chZCho4= +MIIDTTCCAjWgAwIBAgIIOaQfHhnVCb0wDQYJKoZIhvcNAQENBQAwNDELMAkGA1UE +BhMCQU0xEDAOBgNVBAoTB0FybWVTRm8xEzARBgNVBAMTCkFybWVTRm8gQ0EwHhcN +MDMxMjAxMjMyOTQwWhcNMzAxMjAxMjMyOTQwWjA0MQswCQYDVQQGEwJBTTEQMA4G +A1UEChMHQXJtZVNGbzETMBEGA1UEAxMKQXJtZVNGbyBDQTCCASIwDQYJKoZIhvcN +AQEBBQADggEPADCCAQoCggEBALUswjWamaJEbZ0dJ85IuiDRceXW0wMoeCTxoHzQ +dIg0Slh3pJub5HZxEHnJRrBkW9d/t1NDshqMqYg9cdO3fE3nVNR6I5n4EeP8aeom +xI+in3bw3+sFrLt6O7S16Dx2FmnbvDbFP+Ye9eTsdgO21j/4JekqccXNMWigQlyP +E+Z7OygkhD6QPxnNu7460CeS4LAr+zI0xNSaS+WUhPb9uPL3FS1kwovh9mCrkgxn +3gDJ/NRkrdXoRywdOeO5HanYVaXJnqqaKzePriEkcnKkvlcqbuty82BJMvsW9Py3 +eWrkxIMUzGvhWQfTZYB5AHWD10ZuQ4h37ybGdWug8f8H65ECAwEAAaNjMGEwHQYD +VR0OBBYEFPGXCp653/XH3JVPWGS4P09e7G5XMB8GA1UdIwQYMBaAFPGXCp653/XH +3JVPWGS4P09e7G5XMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMA0G +CSqGSIb3DQEBDQUAA4IBAQAkGwifwWPf4NZYlac9o5cW3sqy5qksaDjFd17rZ1lS +irHSa0BiawCRDox8X17Zze4NEh5DHBY3zxnOTSiz1LU1eTs/5dn88i1eFew4kaov +JWSI7/xjdiAjeOXxL2pS/Ez0M8u5HAU+LjvtHdWj1M9In/sJHS3vAk43Zi/l7Ujk +nGwb24HKQqQK8AbJypUjGsT7hLa17GcFdRh5J1986OT63wIdpZS6KstTQlftix7E +dtr+FYaEh3QsH3rYi+vcDBktcfsF8xU8VpmszFcJVxdpfzqcHn5KL77Vbvb66Mw4 +pQArkdCrUpTDhjpIVeC/kGPy8FGAzHvJWWqJvar64iYo -----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/BG-ACAD-CA.info igtf-policy-bundle-1.140/src/accredited/BG-ACAD-CA.info --- igtf-policy-bundle-1.133/src/accredited/BG-ACAD-CA.info 2025-02-11 20:07:50.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/BG-ACAD-CA.info 2026-03-25 13:54:34.000000000 +0000 @@ -5,6 +5,6 @@ crl_url = http://www.ca.acad.bg/crl/bg_acad_ca-crl.pem email = operations@ca.acad.bg status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 6E:CF:1B:7B:D4:5B:3A:00:A4:A1:07:9B:21:B2:97:D5:28:8B:8B:3A subjectdn = "/DC=bg/DC=acad/CN=BG.ACAD CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/CERN-GridCA.info igtf-policy-bundle-1.140/src/accredited/CERN-GridCA.info --- igtf-policy-bundle-1.133/src/accredited/CERN-GridCA.info 2025-02-11 20:07:50.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CERN-GridCA.info 2026-03-25 13:54:34.000000000 +0000 @@ -7,6 +7,6 @@ email = cern-ca-managers@cern.ch requires = CERN-Root-2 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 71:A1:FC:1A:77:68:17:B9:5C:84:89:3A:28:2D:66:70:DC:93:83:CD subjectdn = "/DC=ch/DC=cern/CN=CERN Grid Certification Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/CERN-Root-2.info igtf-policy-bundle-1.140/src/accredited/CERN-Root-2.info --- igtf-policy-bundle-1.133/src/accredited/CERN-Root-2.info 2025-02-11 20:07:51.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CERN-Root-2.info 2026-03-25 13:54:34.000000000 +0000 @@ -6,6 +6,6 @@ url = http://www.cern.ch/ca email = cern-ca-managers@cern.ch status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 57:6E:90:75:DD:66:92:8B:F2:5B:D9:52:D6:37:EA:AD:80:84:CC:9F subjectdn = "/C=ch/O=CERN/CN=CERN Root Certification Authority 2" diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-4.info igtf-policy-bundle-1.140/src/accredited/CESNET-CA-4.info --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-4.info 2025-02-11 20:07:51.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-4.info 2026-03-25 13:54:34.000000000 +0000 @@ -10,6 +10,6 @@ requires = CESNET-CA-Root email = ca@cesnet.cz status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 7B:2F:BA:0C:D9:3F:EE:D2:B0:69:1F:53:E7:EB:AD:05:A7:23:FC:74 subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 4" diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.crl_url igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.crl_url --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.crl_url 2026-03-25 13:54:34.000000000 +0000 @@ -0,0 +1 @@ +http://crl.cesnet-ca.cz/CESNET_CA_5.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.info igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.info --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.info 2026-03-25 13:54:34.000000000 +0000 @@ -0,0 +1,15 @@ +# +# @($)CESNET-CA-5.info +# /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5 +# +alias = CESNET-CA-5 +url = http://www.cesnet.cz/pki/ +ca_url = http://crl.cesnet-ca.cz/CESNET_CA_5.crt +crl_url = http://crl.cesnet-ca.cz/CESNET_CA_5.crl +policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html +requires = CESNET-CA-Root +email = ca@cesnet.cz +status = accredited:classic +version = 1.140 +sha1fp.0 = C8:8C:56:4D:EF:66:6F:4C:8C:29:00:7F:E4:F9:10:79:E2:9A:05:7D +subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5" diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.namespaces igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.namespaces --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.namespaces 2026-03-25 13:54:34.000000000 +0000 @@ -0,0 +1,11 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)CESNET-CA-5.namespaces +# CA alias : CESNET-CA-5 +# subord_of: CESNET-CA-Root2 +# subjectDN: /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5 +# +TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5" \ + PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.pem igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.pem --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.pem 2026-03-25 13:54:34.000000000 +0000 @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF0zCCA7ugAwIBAgIBATANBgkqhkiG9w0BAQ0FADBeMRIwEAYKCZImiZPyLGQB +GRYCY3oxGTAXBgoJkiaJk/IsZAEZFgljZXNuZXQtY2ExEjAQBgNVBAoTCUNFU05F +VCBDQTEZMBcGA1UEAxMQQ0VTTkVUIENBIFJvb3QgMjAeFw0yNTA1MTMxMzI4MTZa +Fw00MzEyMzExMzI4MTZaMFkxEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcGCgmSJomT +8ixkARkWCWNlc25ldC1jYTESMBAGA1UECgwJQ0VTTkVUIENBMRQwEgYDVQQDDAtD +RVNORVQgQ0EgNTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALjv/s91 +VSrQQRi8yig+gMKxLiZzqlzgHFAYVLQGoBVSp4OONVsSyuy6b09PI7iKIbOKtf9S +1ildTJCTFBnVp28J6jSnmEZXQGFsADS/GOEDeVcT2/WE7ycJhEKR1mJRHcHfQLzN +qbOSeug5jbvkDeSwhNhM60i1KT6RFUGgNLnX+/+BnEFA4kKVf9NM0Se6xqzGuHDp +00R/5jZqsfGaJ/wQYlFXVi1D6WmUQOrFFha+hFvSL3rJ5Hj7JOOSHZjTBuml19xn +NMVZzyBCSLLfQ1U/15v1p31LqXgkbGGmowXCqPlhNKZKpTRTWcyEElysN9fxz7KS +n1m5Ok/0SOlD6ZU1YR32ys+2qjFi7+UTv01saxW44xpZ6/53L2Dm41nJfdDRyuKH +wd8S1OQz2bDQv8l07b5ahZ800haKyE43F0K0CdUiZcTSyihSFcU60JOWjv0/dwEm +dBCbaAHUT0Xn5/IXzg/e5u5upHzEm8PdRBYPLDUCCF6SgXJmgEzRBFU5nbzHESSr +VQh4pfE8lCjIlkmi1sc8ei3yDWVftsIagxicdyMakwM9V+cWs82zzUEADvLpqo6j +1j5wmZ1TJnYMVoXywUnrXiakPvl/qHoQk/KjU4fVSgvG+OMoLGUUjDdRJh6gKqiL +p4y4UNfSO1eBm1SfpDbxewPx2jpcHknKpi/zAgMBAAGjgaAwgZ0wDwYDVR0TAQH/ +BAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFE4GqkSSdk8Oedw7jOw1zCSg +75nGMB8GA1UdIwQYMBaAFDlhLpxBVq8k1NhmKedcpdNGZgDhMD0GA1UdHwQ2MDQw +MqAwoC6GLGh0dHA6Ly9jcmwuY2VzbmV0LWNhLmN6L0NFU05FVF9DQV9Sb290XzIu +Y3JsMA0GCSqGSIb3DQEBDQUAA4ICAQCm9lAKBsTBNfTb+MLWe/+r+T8pbnvutIQk +rmibvPmyS3yLc9V7MUH/R1G03CQYBUBe1ZM4pJk1WTeuX6wUODgvcuCy+il6DQ+C +ca85p/vsCAU9AqKknjeRm+HqHib03fAtGktZy4vIwxlQnqzIjxlMFm8f/2lLmClv +xvrGUa26z2O0XJbJIFAgdC/MBQdkXgZRnwXkJkHPBDDNogHsKygHKgTPo/4zVdWG +GbOcP1bE+wz7hyI092ybNvrapABLjoOMvAOkYNMR0HPrNp+B1HSAH/DFdrcu/8Jz +H/YGpwAx762C35OTKaRMguXp4SCgOwJj3FzeHt7BdqyS0gaLzAiqaTQ/7S8tNY/K +IFPXgh+xpJdhpesHx2IFWRi5023/BTc2KByB93T5O/ZzopfA2r9x1FNnr2MG2+Xu +AlaB13RMnSmBj0GKIqYv6rpKicgtCjKhYD4lMceLowgTuEwIH0wq2hnnnPbgM8Pj +cishAhTUbjxiT90goq0HEUN/8lk39ZwK+D7qEj61+OhF3ObjaXy6GusOyA+ORKB4 +GXdXz5FHFUCrsOf4vDZbZXB+CKyekuIj9vHxaJrb7pfN2Y+I/wxbD9fFQd8f/dtU +wHt1IojdLPx2HzYUlWqZOfImJBDKKnAOSMaWkbSkTrH+jRQyxZxh/Wm1G6PQ4hWo +lbFHLKc0/g== +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.signing_policy igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.signing_policy --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-5.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-5.signing_policy 2026-03-25 13:54:34.000000000 +0000 @@ -0,0 +1,4 @@ +# EACL CESNET CA 5 dated 2025-05-13 +access_id_CA X509 '/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5' +pos_rights globus CA:sign +cond_subjects globus '"/DC=cz/DC=cesnet-ca/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root.info igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root.info --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root.info 2025-02-11 20:07:52.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root.info 2026-03-25 13:54:34.000000000 +0000 @@ -9,6 +9,6 @@ policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html email = ca@cesnet.cz status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = E7:84:74:90:F7:11:43:FC:CE:F6:F6:5A:30:DA:1F:23:9E:0F:D7:BA subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root" diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.crl_url igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.crl_url --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.crl_url 2026-03-25 13:54:35.000000000 +0000 @@ -0,0 +1 @@ +http://crl.cesnet-ca.cz/CESNET_CA_Root_2.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.info igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.info --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.info 2026-03-25 13:54:35.000000000 +0000 @@ -0,0 +1,14 @@ +# +# @($)CESNET-CA-Root2 enrolled 2025-05-13 +# Subject: DC = cz, DC = cesnet-ca, O = CESNET CA, CN = CESNET CA Root 2 +# +alias = CESNET-CA-Root2 +url = http://www.cesnet.cz/pki/ +ca_url = http://crl.cesnet-ca.cz/CESNET_CA_Root_2.crt +crl_url = http://crl.cesnet-ca.cz/CESNET_CA_Root_2.crl +policy_url = http://www.cesnet.cz/pki/en/ch-cp-cps.html +email = ca@cesnet.cz +status = accredited:classic +version = 1.140 +sha1fp.0 = FC:7D:E8:09:74:78:91:01:C8:5E:2D:13:7E:CC:F6:97:6E:0B:A6:89 +subjectdn = "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root 2" diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.namespaces igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.namespaces --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.namespaces 2026-03-25 13:54:35.000000000 +0000 @@ -0,0 +1,13 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)CESNET-CA-Root2.namespaces +# CA alias : CESNET-CA-Root2 +# subjectDN: /DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root 2 +# +TO Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root 2" \ + PERMIT Subject "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5" + +To Issuer "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5" \ + PERMIT Subject "/DC=cz/DC=cesnet-ca/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.pem igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.pem --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.pem 2026-03-25 13:54:35.000000000 +0000 @@ -0,0 +1,35 @@ +-----BEGIN CERTIFICATE----- +MIIGCTCCA/GgAwIBAgIEAKvN7zANBgkqhkiG9w0BAQ0FADBeMRIwEAYKCZImiZPy +LGQBGRYCY3oxGTAXBgoJkiaJk/IsZAEZFgljZXNuZXQtY2ExEjAQBgNVBAoTCUNF +U05FVCBDQTEZMBcGA1UEAxMQQ0VTTkVUIENBIFJvb3QgMjAeFw0yMzA5MDEwMDAw +MzZaFw00MzA5MDEwMDAwMzZaMF4xEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcGCgmS +JomT8ixkARkWCWNlc25ldC1jYTESMBAGA1UEChMJQ0VTTkVUIENBMRkwFwYDVQQD +ExBDRVNORVQgQ0EgUm9vdCAyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC +AgEAs5hkw2/zS8pAyaLuc9p2sC9dMVRMiYVJwvLYubAYarSztEGDvq/Y62qqf/TM +0ZhFpqwZrigRup3LjWUVF3ifrpx3vV6pxAifcRLMCh+LYJh0bNopEKVRJs9oGuHs +S9gnaQq8vkWjG7YvL5kK+gbjhK8wcOnECSU7/lGPAULSvBceFhFW1mn/X2QwKkX0 +Tq5gOHiuik4Vezw/uPwfU+LitPEKu96I175azEcYRx60HQgpWtPOCN8Q69MwPQFM +8ZD8qAF3fia2WfXYNKhaWcowqq1gtt3Cpq7cMfTZsNJSuq9+CRsGigngDkk+Gn1E +KSS15/XzONrV0ZwLtBB0VNQH0undBZYBNTh+ZreZ6AmTa52E1U7kCNiJ4bLVuwEV +IwB6PumCXocJC6PUoLmZbYRwWpFoNqUM7H3TZj17Y4bPCEgnUqw/O7w1ACsrdZ4x +O9IDNJj8LoG8tAOVYQswpyfkTVCB6NX+Z3cKlSK3e7EHV6PSNNZsiaKgMK4F5cmF +XhttuuIa6zU+1tbbaYkirLturgEHoFRhwdxDf6KbvS/P2ZVahefgIXd7nz0XQzgU +WBETednpXdYjl0z5TLC5+EwCCRFwjVEbNp9J3+M21Sxfy5o8R41KEtOSI6sN5AoO +QKrGgKJiW1K8G4YmdBeyornWsFNJksOlvaQnt1/jL6nvvpECAwEAAaOBzjCByzAd +BgNVHQ4EFgQUOWEunEFWryTU2GYp51yl00ZmAOEwgYsGA1UdIwSBgzCBgIAUOWEu +nEFWryTU2GYp51yl00ZmAOGhYqRgMF4xEjAQBgoJkiaJk/IsZAEZFgJjejEZMBcG +CgmSJomT8ixkARkWCWNlc25ldC1jYTESMBAGA1UEChMJQ0VTTkVUIENBMRkwFwYD +VQQDExBDRVNORVQgQ0EgUm9vdCAyggQAq83vMA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMA0GCSqGSIb3DQEBDQUAA4ICAQArjMppq84CzqEOs9lSvC9i06iu +VWyekTxp9eqlWMAzlxz6859Is0YDOeSzBpArHR0Cb2QG2EpeWR8Oxd5GYqLkmOjH +1GPtXu5aiN5QW2WYjlqzVguFj4uVrkbkoEofwfM045EwiFsusnKJAofo83spnQ39 +ywvNeofixXZuVpAQeNBfrP7sWOCHpd/YUV9G+Rd0/Iyvr7DvSyoi2hcopoXvYWNT +wM1Gjj3m/PBomNYzRBotNNdW2exL5JfeyL79dv6/EGMkUxcdpobiJDPKeyT3P6TQ +mRpXfm/TNk/45nbaSIrk8AMerk3MQQi9mR6DQFrmEwcrJqYhwac1LDG4WdiRfeRX +XJB8RlSM02AMkr2Wuu6wRjyztJx78LL28DHp4Saog8mPxFIVYsCPQwDlp3OYuHvE +gSZ3q2o6VxI7/bhKJwBciE8BkW3yYspHrmbA2m+frLGcVqFrz/D4Sxe2ugzwAouj +pKvzqD0T76tQ2dYFc/+Vtga484/MhvU3v56ik3KnbHCdF4myaigtwG0xxAQavqh7 +Yvzct9GY0hh8258XGiodpHnHN4lAhwPpAFnG2t7DLFdHSk7+eJ4NyfV94ul0hrEl +L8XXy0e+vtXrM8+qMlKuSLlDzk6RXHSgzUNjzVUr5gZFxdH+Tfvaj6FsvTP2l1Ub +x/TQKzzC6hozsuN6Ug== +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.signing_policy igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.signing_policy --- igtf-policy-bundle-1.133/src/accredited/CESNET-CA-Root2.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/CESNET-CA-Root2.signing_policy 2026-03-25 13:54:35.000000000 +0000 @@ -0,0 +1,5 @@ +# EACL CESNET-CA-Root2 +access_id_CA X509 '/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root 2' +pos_rights globus CA:sign +cond_subjects globus '"/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA Root 2" "/DC=cz/DC=cesnet-ca/O=CESNET CA/CN=CESNET CA 5"' +# diff -Nru igtf-policy-bundle-1.133/src/accredited/DCAROOT-G1.info igtf-policy-bundle-1.140/src/accredited/DCAROOT-G1.info --- igtf-policy-bundle-1.133/src/accredited/DCAROOT-G1.info 2025-02-11 20:07:52.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DCAROOT-G1.info 2026-03-25 13:54:35.000000000 +0000 @@ -9,6 +9,6 @@ email = ca@dutchgrid.nl status = accredited:classic url = https://ca.dutchgrid.nl/dcaroot/ -version = 1.133 +version = 1.140 sha1fp.0 = 3C:40:ED:01:2A:05:BB:81:25:CA:05:09:A4:90:08:B3:5D:AC:78:8F subjectdn = "/DC=nl/DC=dutchgrid/O=Certification Authorities/CN=DCA Root G1 CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/DFN-GridGermany-Root.info igtf-policy-bundle-1.140/src/accredited/DFN-GridGermany-Root.info --- igtf-policy-bundle-1.133/src/accredited/DFN-GridGermany-Root.info 2025-02-11 20:07:53.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DFN-GridGermany-Root.info 2026-03-25 13:54:35.000000000 +0000 @@ -8,6 +8,6 @@ email = dfnpca@dfn-cert.de status = accredited:classic url = https://www.pki.dfn.de/grid/ -version = 1.133 +version = 1.140 sha1fp.0 = 30:AB:8B:7C:DA:20:93:E5:59:CE:74:0D:B1:2A:82:38:C8:55:0B:D4 subjectdn = "/C=DE/O=DFN-Verein/OU=DFN-PKI/CN=DFN-Verein PCA Grid - G01" diff -Nru igtf-policy-bundle-1.133/src/accredited/DZeScience.info igtf-policy-bundle-1.140/src/accredited/DZeScience.info --- igtf-policy-bundle-1.133/src/accredited/DZeScience.info 2025-02-11 20:07:53.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DZeScience.info 2026-03-25 13:54:35.000000000 +0000 @@ -9,6 +9,6 @@ email = ca@grid.arn.dz status = accredited:classic url = http://www.grid.arn.dz -version = 1.133 +version = 1.140 sha1fp.0 = D8:EF:90:DB:6A:9B:63:47:4C:1D:6E:89:E2:A2:4D:5D:86:FC:2B:2C subjectdn = "/DC=DZ/DC=ARN/O=DZ e-Science GRID/CN=DZ e-Science CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.info igtf-policy-bundle-1.140/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.info --- igtf-policy-bundle-1.133/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.info 2025-02-11 20:07:54.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DigiCert-Assured-ID-Grid-Client-RSA2048-SHA256-2022-CA1.info 2026-03-25 13:54:35.000000000 +0000 @@ -8,6 +8,6 @@ status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertAssuredIDRootCA-Root -version = 1.133 +version = 1.140 sha1fp.0 = 95:78:D8:36:3F:CF:2A:BC:58:57:D4:B4:4B:9E:C4:16:0D:95:03:C0 subjectdn = "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid Client RSA2048 SHA256 2022 CA1" diff -Nru igtf-policy-bundle-1.133/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.info igtf-policy-bundle-1.140/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.info --- igtf-policy-bundle-1.133/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.info 2025-02-11 20:07:54.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DigiCert-Assured-ID-Grid-TLS-RSA2048-SHA256-2022-CA1.info 2026-03-25 13:54:35.000000000 +0000 @@ -8,6 +8,6 @@ status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertAssuredIDRootCA-Root -version = 1.133 +version = 1.140 sha1fp.0 = DD:E0:C4:B0:5A:36:B1:09:F1:44:ED:51:C5:90:B6:BF:67:E3:05:70 subjectdn = "/C=US/O=DigiCert, Inc./CN=DigiCert Assured ID Grid TLS RSA2048 SHA256 2022 CA1" diff -Nru igtf-policy-bundle-1.133/src/accredited/DigiCertAssuredIDRootCA-Root.info igtf-policy-bundle-1.140/src/accredited/DigiCertAssuredIDRootCA-Root.info --- igtf-policy-bundle-1.133/src/accredited/DigiCertAssuredIDRootCA-Root.info 2025-02-11 20:07:55.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DigiCertAssuredIDRootCA-Root.info 2026-03-25 13:54:36.000000000 +0000 @@ -7,6 +7,6 @@ email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ -version = 1.133 +version = 1.140 sha1fp.0 = 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43 subjectdn = "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/DigiCertGridCA-1G2-Classic-2015.info igtf-policy-bundle-1.140/src/accredited/DigiCertGridCA-1G2-Classic-2015.info --- igtf-policy-bundle-1.133/src/accredited/DigiCertGridCA-1G2-Classic-2015.info 2025-02-11 20:07:55.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DigiCertGridCA-1G2-Classic-2015.info 2026-03-25 13:54:36.000000000 +0000 @@ -8,6 +8,6 @@ status = accredited:classic url = http://www.digicert-grid.com/ requires = DigiCertGridRootCA-Root -version = 1.133 +version = 1.140 sha1fp.0 = 62:2C:7B:96:DA:67:46:CD:B5:C9:35:B8:FE:78:3B:77:35:16:FC:E3 subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid CA-1 G2" diff -Nru igtf-policy-bundle-1.133/src/accredited/DigiCertGridRootCA-Root.info igtf-policy-bundle-1.140/src/accredited/DigiCertGridRootCA-Root.info --- igtf-policy-bundle-1.133/src/accredited/DigiCertGridRootCA-Root.info 2025-02-11 20:07:55.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DigiCertGridRootCA-Root.info 2026-03-25 13:54:36.000000000 +0000 @@ -7,6 +7,6 @@ email = prodseccompliance@digicert.com status = accredited:classic url = http://www.digicert-grid.com/ -version = 1.133 +version = 1.140 sha1fp.0 = 02:FB:FF:2E:77:A9:CE:9C:FA:A9:3F:F0:83:0E:3E:80:6F:D0:6F:8D subjectdn = "/DC=com/DC=DigiCert-Grid/O=DigiCert Grid/CN=DigiCert Grid Root CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/DigiCertGridTrustCAG2-Classic.info igtf-policy-bundle-1.140/src/accredited/DigiCertGridTrustCAG2-Classic.info --- igtf-policy-bundle-1.133/src/accredited/DigiCertGridTrustCAG2-Classic.info 2025-02-11 20:07:56.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/DigiCertGridTrustCAG2-Classic.info 2026-03-25 13:54:36.000000000 +0000 @@ -8,6 +8,6 @@ status = accredited:classic url = http://www.DigiCert-Grid.com/ requires = DigiCertAssuredIDRootCA-Root -version = 1.133 +version = 1.140 sha1fp.0 = 06:01:40:42:57:78:0C:9F:E6:B3:D9:03:72:80:3F:38:EE:3A:60:6A subjectdn = "/C=US/O=DigiCert Grid/OU=www.digicert.com/CN=DigiCert Grid Trust CA G2" diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.crl_url igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.crl_url --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.crl_url 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1 @@ +http://crl.emsign.com/?EMOVTLSCAG2A1.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.info igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.info --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.info 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,16 @@ +# +# @(#)EMOVTLSCAG2A1.info +# eMuhdra emSign Issuing Certifying Authority Global +# TLS server specific joint trust hierarchy root +# +alias = EMOVTLSCAG2A1 +ca_url = https://repository.emsign.com/certs/EMOVTLSCAG2A1.crt +crl_url = http://crl.emsign.com/?EMOVTLSCAG2A1.crl +policy_url = https://repository.emsign.com/ +url = https://emudhra.com/products/digital-certificates +email = support@emsign.com +status = accredited:classic +requires = emSignRootTLSCAG1 +version = 1.140 +sha1fp.0 = DB:8C:91:4F:31:35:C2:71:68:5B:10:2C:05:43:F7:DF:45:C9:47:E6 +subjectdn = "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.namespaces igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.namespaces --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.namespaces 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,19 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)EMOVTLSCAG2A1.namespaces +# CA alias : EMOVTLSCAG2A1 +# subord_of: emSignRootTLSCAG1 +# subjectDN: /C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1 +# hash : EMOVTLSCAG2A1.signing_policy +# (generated automatically from EMOVTLSCAG2A1.signing_policy) +# +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" \ + PERMIT Subject "/C=US/O=emSignGrid/.*" + +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" \ + PERMIT Subject "/DC=com/DC=emSignGrid/.*" + +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" \ + PERMIT Subject "/DC=org/DC=emSignGrid/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.pem igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.pem --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.pem 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,39 @@ +-----BEGIN CERTIFICATE----- +MIIGyzCCBLOgAwIBAgIPWUkUCeeX6paPBeD/Mx/sMA0GCSqGSIb3DQEBDAUAMFYx +CzAJBgNVBAYTAklOMSUwIwYDVQQKDBxlTXVkaHJhIFRlY2hub2xvZ2llcyBMaW1p +dGVkMSAwHgYDVQQDDBdlbVNpZ24gUm9vdCBUTFMgQ0EgLSBHMTAeFw0yNTA1Mjkw +NzIzNDFaFw00MDA1MjgwNzIzNDFaMFMxCzAJBgNVBAYTAklOMSUwIwYDVQQKDBxl +TXVkaHJhIFRlY2hub2xvZ2llcyBMaW1pdGVkMR0wGwYDVQQDDBRFTSBPViBUTFMg +Q0EgLSBHMkEtMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAO2PpAf8 +c7qXWx1YQmydsHiK1jxFEOL82M1yXpVOQGwUNy05OtC4YOpIuWYriOi6+L3W8mvg +sa97lWE5MBv0VgTKUoJL2mazMgjY0gfKBBmAzNyM5NCnYlq0iolFnVKERYSN6ptW +66drTr+iPwj488CpEu++9YkWQSXIqsJR5PqY9U5CupP/pp/46WnTdMMA6okpUvid +FwSkPo3bGMbKwLSWi526gJqZGbFOzEkAf1qx0Z4kfafZaKlStiy6p8cTMJPVBXqU +T1z26cxdxvcTWAg4squqoIZfSPzqkMo2ZIFrb/7o0t09SStXHCjh00oLE4CpIbsC +zJr0itjCj8YIN3WW5lzecjQQDIXWXXdQqOU4HslaNRp5DGUv1Ral8VBAjzVpJRED +eL/pbsxka594qZw7KWbuZqN3o/D/ivWAa4jEl0CT5DkTbs82u6K8EwUlGtYxFC/X +wLKY2Bn6l9l9WugEv7CCOZQoc28Q4rRu4BxM9OD41jcvgLdr1pZxzdH14F/X/UlC +kTcx+kpVniP+EMq9iIZRSz4T/l0oS+XJcAH+skX7HawyGnH34wUXxFkPQJzU1LHc +5WeLsd5s8IASQXiBxIt1TaLfyyUFxWLnmXMt14dIUYJhsDN3Wn28KpUVwnBwvLHJ +T5cvQJCB3L8uIkXNzOFiBvXhHqmtTqYXu/HzAgMBAAGjggGXMIIBkzAfBgNVHSME +GDAWgBRkHcnY+MTsBEsigfUyml6555NS+TAdBgNVHQ4EFgQUN8TSSvkoZUHO+JQT +fyAV7qeAXTcwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMF0GA1UdIARW +MFQwOQYLKwYBBAGDjiEBAAEwKjAoBggrBgEFBQcCARYcaHR0cDovL3JlcG9zaXRv +cnkuZW1zaWduLmNvbTANBgsrBgEEAYOOIQECbjAIBgZngQwBAgIwdgYIKwYBBQUH +AQEEajBoMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC1hLmVtc2lnbi5jb20wQAYI +KwYBBQUHMAKGNGh0dHA6Ly9yZXBvc2l0b3J5LmVtc2lnbi5jb20vY2VydHMvRU1P +VlRMU0NBRzJBMS5wN2MwNwYDVR0fBDAwLjAsoCqgKIYmaHR0cDovL2NybC5lbXNp +Z24uY29tLz9yb290dGxzY2FnMS5jcmwwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB +/wQIMAYBAf8CAQAwDQYJKoZIhvcNAQEMBQADggIBAJbm34Q8lrrOCLMFpCRvmNEN +KdGDso4IGVbcrmyk66vAne2SvINDLX/oldg1I86HqijP7N0tC899hYLMAD3svlHn +88h+zWAntD986ciR4MqZBjtZhSH3KlX3hxv96QjMP0vQvJ2mJiXqSqBs5evt2HfJ +TrDhWZ9W7Kqq6zQmqYoNjWJRNtktuGcvv9A1xFIrIwI18uDAM0s4OMO8JYLt4Wt7 +NT/4tZYCQ/E+6VqEVkflXRwFPuNcQ3chnwpzQFtpgohpjz9SyZ59quStezTBcrh8 +nsC42M3fDQqgBdjWiMph99J15UAPUP9I3fr5pzJzU4xx36TeTo2D2WoEGplhmkW5 +5GBP7Q/a+1k2zY8unZpSqaeNAOmqSifkq1yV/yRp0YCg0TIi7bXjFXg/xOF5XICx +4UkO/pBkUe5GFh+4BsIi5z1P/4Q6/mRS+F3X3AKqDkprhDpDtHHDyrq1tcSO7v7Q +ZsfZhTBBfXIUKZS/qfKYB76FwV7e2ObUaxwe+hY43CCaxMRBPGpiLtFSbb2UcjZT +fmGjrVUoroczrYIo6+TfvC3IWIgZh7Iw5Verlss9acd/OAbQI3LABpxEu8bei32F +JrHA05Pm8Lg042vWP40givmqPhfSdsouqxEzLsK4Y7jkZ1zz2PmVfmakU2m4LTZM +4KV3lYXal1HR8w6Yq/dg +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.signing_policy igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.signing_policy --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2A1.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2A1.signing_policy 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,4 @@ +# EACL for eMudhra emSign ICA TLS hierarchy OV Global + access_id_CA X509 '/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1' + pos_rights globus CA:sign + cond_subjects globus '"/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.crl_url igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.crl_url --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.crl_url 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1 @@ +http://crl.emsign.com/?EMOVTLSCAG2B.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.info igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.info --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.info 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,16 @@ +# +# @(#)EMOVTLSCAG2B.info +# eMuhdra emSign Issuing Certifying Authority EU +# TLS server specific joint trust hierarchy root +# +alias = EMOVTLSCAG2B +ca_url = https://repository.emsign.com/certs/EMOVTLSCAG2B.crt +crl_url = http://crl.emsign.com/?EMOVTLSCAG2B.crl +policy_url = https://repository.emsign.com/ +url = https://emudhra.com/products/digital-certificates +email = support@emsign.com +status = accredited:classic +requires = emSignRootTLSCAG1 +version = 1.140 +sha1fp.0 = CF:47:00:E4:24:38:DA:28:E3:34:5E:91:86:67:06:C3:71:26:5C:BE +subjectdn = "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.namespaces igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.namespaces --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.namespaces 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,19 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)EMOVTLSCAG2B.namespaces +# CA alias : EMOVTLSCAG2B +# subord_of: emSignRootTLSCAG1 +# subjectDN: /C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B +# hash : EMOVTLSCAG2B.signing_policy +# (generated automatically from EMOVTLSCAG2B.signing_policy) +# +TO Issuer "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" \ + PERMIT Subject "/C=US/O=emSignGrid/.*" + +TO Issuer "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" \ + PERMIT Subject "/DC=com/DC=emSignGrid/.*" + +TO Issuer "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" \ + PERMIT Subject "/DC=org/DC=emSignGrid/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.pem igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.pem --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.pem 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,38 @@ +-----BEGIN CERTIFICATE----- +MIIGtzCCBJ+gAwIBAgIQAMFk25gE9WMkHtMsQQClZjANBgkqhkiG9w0BAQwFADBW +MQswCQYDVQQGEwJJTjElMCMGA1UECgwcZU11ZGhyYSBUZWNobm9sb2dpZXMgTGlt +aXRlZDEgMB4GA1UEAwwXZW1TaWduIFJvb3QgVExTIENBIC0gRzEwHhcNMjUwNDMw +MTU0OTQ0WhcNNDAwNDI4MTgzMDAwWjA/MQswCQYDVQQGEwJOTDETMBEGA1UECgwK +ZU11ZGhyYSBCVjEbMBkGA1UEAwwSRU0gT1YgVExTIENBIC0gRzJCMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEApIC2Np2Jg7Hj44o00ilqDHD0++5wkIqh +/37olLuxpASJ5uA+wk7iMSCP7j9cMl4Bwx6EIu9R4vp8wtPY7Obfw08OmzurVK97 +zqwykMWfn45mdMmQTxYsgaduZu4o8s1mHBHJo86BBp09CkW43W1dcS2YyG/Micdc +28bULl7sJfO2cSd/+M0bgV+rlCnBGIcjRljEIJ8AFW6I9D0mtQT3LFoxIjux89aa +5trLBblReP0KvxGxY+DLs6Lqyku3sg0hMk0oKgLPghdh0BfmAVN3Ob7sUTNgVXb3 +0TxdkfqZvf6COIbIfvTamVpqPzCZwwRDDLx8BoxY+uE2Cd8R5kh8ZGAlfI7xbVf+ +26Vd/Ak53iEZmGsypOaSdrJH2dYyZjCo5Rv+gdI5G8xg264JDXjwBYN7ml9MbGEc +NBnq3giSeils0WF8rWSEm5Ehn3QS9QdGNHQBNYnu5pnawkf6RmzQ15EnEfJxXrR8 +7vkrD0c2KTKZLkYaRmuCLow73MGQXYGxbo0yuhywp+XKDEjmc1muW0xU3KzBQw6i +dd0aGHwHYkwcs7JQNRLJglEXZ5mupQDJPTJOVtAznfLg3/Fc2ma7CS55BO2zm50l +e7aVj3TjeeTRE6YlIG6EMtW4Zn1N1PL1SbGUWZR8szf5K32jfotvn1r0ODI6obOG +F3x0uU6tc/ECAwEAAaOCAZYwggGSMB8GA1UdIwQYMBaAFGQdydj4xOwESyKB9TKa +Xrnnk1L5MB0GA1UdDgQWBBR7nhnP7gJef3vn8dlQkSHtRA2JCjAdBgNVHSUEFjAU +BggrBgEFBQcDAQYIKwYBBQUHAwIwXQYDVR0gBFYwVDA5BgsrBgEEAYOOIQEAATAq +MCgGCCsGAQUFBwIBFhxodHRwOi8vcmVwb3NpdG9yeS5lbXNpZ24uY29tMA0GCysG +AQQBg44hAQJuMAgGBmeBDAECAjB1BggrBgEFBQcBAQRpMGcwJAYIKwYBBQUHMAGG +GGh0dHA6Ly9vY3NwLWIuZW1zaWduLmNvbTA/BggrBgEFBQcwAoYzaHR0cDovL3Jl +cG9zaXRvcnkuZW1zaWduLmNvbS9jZXJ0cy9FTU9WVExTQ0FHMkIucDdjMDcGA1Ud +HwQwMC4wLKAqoCiGJmh0dHA6Ly9jcmwuZW1zaWduLmNvbS8/cm9vdHRsc2NhZzEu +Y3JsMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEAMA0GCSqGSIb3 +DQEBDAUAA4ICAQA7yUVixWp4/njci9u5YgCoZ5Q3p5bsefOlMn9w7ChNTEtUa49O +Xn72PyBZsOunXNL/8ouN8fkAcpe2TOT0n7RymveSc4oPde7SVn7ns4BJgez+7Yo8 +g2E7/L5dq0wzbi0/ivc3AsYXfI4MLA2wOZ5eYzROCUDcFQldSBoMphRJLggKbFGp +CThxz0suHOg5KTSrGZ9PGCLzghY5Y2Eo5kLm9ya0OW667RVayB6aKSrpl9MZJ7zC +zBXHLO85PvYxckX5px6EzPGdOlOvEhlA3uQ/x/iHkzicit2oBk/OUx6v3a8VHjah +aow1bhQxVMeEwp0LAK/bw0Qm3bDkALX481LFJo24EwftNPJyKuDcQD82SPrg8Nvb +uBN1q9S6O1JyIsU8YITC8gqFPmoRl/ubosWfEjTDRp/9JYpKCsJkqs+3vWonWVMV +trK5vILtnV9N+Q9Um4vqKo6dMJtsSMVZw+oTnoFjlL9v7XMeRFy9+kUJA81haQ+3 +RJh8YQnP5E+rQC9QiJhQ9paT976vQXDYJjdns9oeCl+fOvcw5GXI2Wb4v4EnovUz +Zx4mn67r2MDtuWTHR4hDQE4V7uHh3QQDu0S8/QCK9oc5F67qZ9oeZLbWnMcy7LRL +/IHFMrCtcm2+oh7khqLU7m2sUTyEZcztyRUSQokOkFY9BXNWENjmw7NVew== +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.signing_policy igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.signing_policy --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2B.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2B.signing_policy 2026-03-25 13:54:36.000000000 +0000 @@ -0,0 +1,4 @@ +# EACL for eMudhra emSign ICA TLS hierarchy OV EU + access_id_CA X509 '/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B' + pos_rights globus CA:sign + cond_subjects globus '"/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.crl_url igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.crl_url --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.crl_url 2026-03-25 13:54:37.000000000 +0000 @@ -0,0 +1 @@ +http://crl.emsign.com/?EMOVTLSCAG2C.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.info igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.info --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.info 2026-03-25 13:54:37.000000000 +0000 @@ -0,0 +1,16 @@ +# +# @(#)EMOVTLSCAG2C.info +# eMuhdra emSign Issuing Certifying Authority US +# TLS server specific joint trust hierarchy root +# +alias = EMOVTLSCAG2C +ca_url = https://repository.emsign.com/certs/EMOVTLSCAG2C.crt +crl_url = http://crl.emsign.com/?EMOVTLSCAG2C.crl +policy_url = https://repository.emsign.com/ +url = https://emudhra.com/products/digital-certificates +email = support@emsign.com +status = accredited:classic +requires = emSignRootTLSCAG1 +version = 1.140 +sha1fp.0 = 28:C0:C7:77:41:C2:82:92:7D:88:9D:A8:71:45:B4:E2:F4:BB:FD:D3 +subjectdn = "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.namespaces igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.namespaces --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.namespaces 2026-03-25 13:54:37.000000000 +0000 @@ -0,0 +1,19 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)EMOVTLSCAG2C.namespaces +# CA alias : EMOVTLSCAG2C +# subord_of: emSignRootTLSCAG1 +# subjectDN: /C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C +# hash : EMOVTLSCAG2C.signing_policy +# (generated automatically from EMOVTLSCAG2C.signing_policy) +# +TO Issuer "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" \ + PERMIT Subject "/C=US/O=emSignGrid/.*" + +TO Issuer "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" \ + PERMIT Subject "/DC=com/DC=emSignGrid/.*" + +TO Issuer "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" \ + PERMIT Subject "/DC=org/DC=emSignGrid/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.pem igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.pem --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.pem 2026-03-25 13:54:37.000000000 +0000 @@ -0,0 +1,38 @@ +-----BEGIN CERTIFICATE----- +MIIGuDCCBKCgAwIBAgIQAMvc+g1kEScJzxS35IWCUDANBgkqhkiG9w0BAQwFADBW +MQswCQYDVQQGEwJJTjElMCMGA1UECgwcZU11ZGhyYSBUZWNobm9sb2dpZXMgTGlt +aXRlZDEgMB4GA1UEAwwXZW1TaWduIFJvb3QgVExTIENBIC0gRzEwHhcNMjUwNDMw +MTQyODAxWhcNNDAwNDI4MTgzMDAwWjBAMQswCQYDVQQGEwJVUzEUMBIGA1UECgwL +ZU11ZGhyYSBJbmMxGzAZBgNVBAMMEkVNIE9WIFRMUyBDQSAtIEcyQzCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJwXv21tp+qJJXHjT+cjAxeGHCuHZHD2 +cdzBd1L5veXk9PEQHJxnz/U0I18YcCPbOgpPoASUySke6uzIymKAntfmivc+gHTC +O58paTCq1URw6MyAO47Cde+UDDuesO3PgmcndcS8Oaz7fTykI0rpS+jnffviT0rB +zMdB0YqmYsDAJ+e1LK97RUoSeSDUOTwii5UGzvKc2NT3ntSqZa2+GSd7b22BVTh7 +9ECAaiPgyG294Q9yUkL677YAiwLYAM9pJEbF4h9OoKwZrwoZ8DmBOTHqiGRV8wN5 +AbKL0NrsH1g23L/bZqP35zIMNyP7MfAbswGJCF3+O+BB//gL3s+hmcQ1vTT/ISb4 +6LK5VieycbWsZSV0wi4ZyVlH7ZCVpKUpFJlhY+q3Vku8abvAmW+AsfFFiMJIIsZP +4AgyoRYixs262rDlOKmraTRqBqukP7IruEG/tywQuSJQSYpVM3CCgVc/m9IyCQQ9 +muXGXT6L6gHaCKRzNHdEvDM0TEbIIMBxa8H6zFsSNwzYjXinQS727Md0BrgWpVnc +iv++9a7XDQN2TlZ1veVLMJXguOlbIieqTD8IoSIWKggIFidPzjPaLjlR1bKQBGR8 +HsY0PdX+AlHKtgJk9BoVeZk7cNVkVb7/gkHAAhqd3jgUZAM+dYW35ZcL14Kr9dlx +jLzJxxAlyUI/AgMBAAGjggGWMIIBkjAfBgNVHSMEGDAWgBRkHcnY+MTsBEsigfUy +ml6555NS+TAdBgNVHQ4EFgQUdOE6o+hENzdytPXxJdoF01D2Fi0wHQYDVR0lBBYw +FAYIKwYBBQUHAwEGCCsGAQUFBwMCMF0GA1UdIARWMFQwOQYLKwYBBAGDjiEBAAEw +KjAoBggrBgEFBQcCARYcaHR0cDovL3JlcG9zaXRvcnkuZW1zaWduLmNvbTANBgsr +BgEEAYOOIQECbjAIBgZngQwBAgIwdQYIKwYBBQUHAQEEaTBnMCQGCCsGAQUFBzAB +hhhodHRwOi8vb2NzcC1jLmVtc2lnbi5jb20wPwYIKwYBBQUHMAKGM2h0dHA6Ly9y +ZXBvc2l0b3J5LmVtc2lnbi5jb20vY2VydHMvRU1PVlRMU0NBRzJDLnA3YzA3BgNV +HR8EMDAuMCygKqAohiZodHRwOi8vY3JsLmVtc2lnbi5jb20vP3Jvb3R0bHNjYWcx +LmNybDAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADANBgkqhkiG +9w0BAQwFAAOCAgEAlbEH1rcK2eY9/vJY7h16AsjO+SrNzASq1CVqnOvIi+3e/4d9 +zjBwes1nJA1NGgEmQ/H8Ql81KflomsHVXfLB1t4J0rRgBdTnZN29O7+F+WXqiPgW +XaQooGMt6vU4frs8Aw3JMz7iYnhB22U+WlC9OIVeM7yLskbk4QrJZDfMRBgYO/cz +KEqn6fSYpqRm6rsRpScS+0JQnrCGMoRekYEHhspLVq4zgDOVozfz3jkuNrmm6bjR +WQ2bLaAyxxTH8CzCZwPF/+Difkpw/2CaLiXCypc9lpV3sb21RgFs/7xWfO4yiaYR +ZNMhd7DCN1D421+sw6WYRFGRicYqVQ9ZQfNUmxew1cCOJ7NYHxZCEKZfOByKCBtd +vnbOO/mUWaghyArGawOsgxR1lGYkp0VIcaEGn3H229ON3Di2/BFF5DN4TXTLOH5X +m6XFr3/x7LcnJ3fJlOV38Dhw68n1/kHVKDWyLrJiUalNagmBHDP0pkk+S0ZW+9Ug +mA5jQGRtJ83Q7EIGQl3Y1NUtcw+ms6q2FsuDbZb4/uhkO/yyruqEGAWfQ6Sfe0ql +zcI9mS/0cbniRh0qC0bMIdnDh3w5V8OsDKAl8WAsZPdYutJRlC8rkWStlaftFMsb +6nQ9cmYyS8sht4f+zPwhSn1TNQSmfTXGn+X2lKu/JOgrQ4AFpOspjiD1tok= +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.signing_policy igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.signing_policy --- igtf-policy-bundle-1.133/src/accredited/EMOVTLSCAG2C.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/EMOVTLSCAG2C.signing_policy 2026-03-25 13:54:37.000000000 +0000 @@ -0,0 +1,4 @@ +# EACL for eMudhra emSign ICA TLS hierarchy OV US + access_id_CA X509 '/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C' + pos_rights globus CA:sign + cond_subjects globus '"/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" "/C=US/O=emSignGrid/*" "/DC=com/DC=emSignGrid/*" "/DC=org/DC=emSignGrid/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationECCCA4B.info igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationECCCA4B.info --- igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationECCCA4B.info 2025-02-11 20:07:56.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationECCCA4B.info 2026-03-25 13:54:37.000000000 +0000 @@ -9,6 +9,6 @@ email = tcs-pma@lists.geant.org requires = ResearchandEducationTrustECCRootCA status = accredited:mics -version = 1.133 +version = 1.140 sha1fp.0 = 7F:BE:B5:74:F1:DA:A1:3D:5E:EA:A6:9B:2B:EE:FB:EA:6D:DF:BD:03 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 4B" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationECCCA5.info igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationECCCA5.info --- igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationECCCA5.info 2025-02-11 20:07:57.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationECCCA5.info 2026-03-25 13:54:37.000000000 +0000 @@ -9,6 +9,6 @@ email = tcs-pma@lists.geant.org requires = GEANTTCSRETrustECCRootCA5 status = accredited:mics -version = 1.133 +version = 1.140 sha1fp.0 = 95:45:0E:B1:BB:D3:E0:DE:5A:FC:BE:86:01:12:52:08:00:F7:7A:85 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication ECC CA 5" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationRSACA4B.info igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationRSACA4B.info --- igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationRSACA4B.info 2025-02-11 20:07:57.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationRSACA4B.info 2026-03-25 13:54:37.000000000 +0000 @@ -9,6 +9,6 @@ email = tcs-pma@lists.geant.org requires = ResearchandEducationTrustRSARootCA status = accredited:mics -version = 1.133 +version = 1.140 sha1fp.0 = CE:26:13:AF:EB:4A:D8:EC:10:12:8E:85:4B:57:D8:D5:66:FE:86:66 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 4B" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationRSACA5.info igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationRSACA5.info --- igtf-policy-bundle-1.133/src/accredited/GEANTTCSAuthenticationRSACA5.info 2025-02-11 20:07:58.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTTCSAuthenticationRSACA5.info 2026-03-25 13:54:37.000000000 +0000 @@ -9,6 +9,6 @@ email = tcs-pma@lists.geant.org requires = GEANTTCSRETrustRSARootCA5 status = accredited:mics -version = 1.133 +version = 1.140 sha1fp.0 = 3E:5A:BA:94:11:1B:54:A3:86:19:1F:42:69:AD:1A:59:58:ED:0E:3D subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT TCS Authentication RSA CA 5" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTTCSRETrustECCRootCA5.info igtf-policy-bundle-1.140/src/accredited/GEANTTCSRETrustECCRootCA5.info --- igtf-policy-bundle-1.133/src/accredited/GEANTTCSRETrustECCRootCA5.info 2025-02-11 20:07:58.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTTCSRETrustECCRootCA5.info 2026-03-25 13:54:37.000000000 +0000 @@ -8,6 +8,6 @@ url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 2D:1F:B8:B8:78:5B:03:2B:C0:E4:0A:43:83:5E:6F:A2:48:AB:75:2B subjectdn = "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust ECC Root CA 5" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTTCSRETrustRSARootCA5.info igtf-policy-bundle-1.140/src/accredited/GEANTTCSRETrustRSARootCA5.info --- igtf-policy-bundle-1.133/src/accredited/GEANTTCSRETrustRSARootCA5.info 2025-02-11 20:07:59.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTTCSRETrustRSARootCA5.info 2026-03-25 13:54:38.000000000 +0000 @@ -8,6 +8,6 @@ url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 44:9D:FA:FA:B8:F8:40:CC:1F:9D:7A:F9:BE:93:72:35:14:3C:71:0B subjectdn = "/C=NL/O=GEANT Vereniging/CN=Research and Education Trust RSA Root CA 5" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTeSciencePersonalCA4.info igtf-policy-bundle-1.140/src/accredited/GEANTeSciencePersonalCA4.info --- igtf-policy-bundle-1.133/src/accredited/GEANTeSciencePersonalCA4.info 2025-02-11 20:07:59.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTeSciencePersonalCA4.info 2026-03-25 13:54:38.000000000 +0000 @@ -10,6 +10,6 @@ requires = USERTrustRSACertificationAuthority email = tcs-pma@lists.geant.org status = accredited:mics -version = 1.133 +version = 1.140 sha1fp.0 = AD:5F:20:A4:13:B8:31:5F:1C:5F:0C:9A:ED:79:C9:83:15:76:33:06 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal CA 4" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTeSciencePersonalECCCA4.info igtf-policy-bundle-1.140/src/accredited/GEANTeSciencePersonalECCCA4.info --- igtf-policy-bundle-1.133/src/accredited/GEANTeSciencePersonalECCCA4.info 2025-02-11 20:08:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTeSciencePersonalECCCA4.info 2026-03-25 13:54:38.000000000 +0000 @@ -10,6 +10,6 @@ requires = USERTrustECCCertificationAuthority email = tcs-pma@lists.geant.org status = accredited:mics -version = 1.133 +version = 1.140 sha1fp.0 = 9A:93:3E:0E:07:65:97:52:DA:AD:19:B0:1C:72:CA:89:E4:D2:F9:DA subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience Personal ECC CA 4" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTeScienceSSLCA4.info igtf-policy-bundle-1.140/src/accredited/GEANTeScienceSSLCA4.info --- igtf-policy-bundle-1.133/src/accredited/GEANTeScienceSSLCA4.info 2025-02-11 20:08:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTeScienceSSLCA4.info 2026-03-25 13:54:38.000000000 +0000 @@ -10,6 +10,6 @@ requires = USERTrustRSACertificationAuthority email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = E9:3B:5F:C1:89:2B:69:31:61:84:F1:DD:1E:A0:C5:F7:71:6F:85:96 subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL CA 4" diff -Nru igtf-policy-bundle-1.133/src/accredited/GEANTeScienceSSLECCCA4.info igtf-policy-bundle-1.140/src/accredited/GEANTeScienceSSLECCCA4.info --- igtf-policy-bundle-1.133/src/accredited/GEANTeScienceSSLECCCA4.info 2025-02-11 20:08:01.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GEANTeScienceSSLECCCA4.info 2026-03-25 13:54:38.000000000 +0000 @@ -10,6 +10,6 @@ requires = USERTrustECCCertificationAuthority email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 81:6A:8A:8C:3D:ED:B3:E8:5C:40:61:B5:A3:85:61:39:10:9D:FE:0A subjectdn = "/C=NL/O=GEANT Vereniging/CN=GEANT eScience SSL ECC CA 4" diff -Nru igtf-policy-bundle-1.133/src/accredited/GridCanada.info igtf-policy-bundle-1.140/src/accredited/GridCanada.info --- igtf-policy-bundle-1.133/src/accredited/GridCanada.info 2025-02-11 20:08:01.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/GridCanada.info 2026-03-25 13:54:38.000000000 +0000 @@ -7,6 +7,6 @@ url = http://www.gridcanada.ca/ca email = ca@gridcanada.ca status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = EC:7C:F3:83:F3:B5:55:99:48:76:3E:66:AA:02:C6:FC:1D:CC:83:5E subjectdn = "/C=CA/O=Grid/CN=Grid Canada Certificate Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/HARICAGEANTTLSECC1.info igtf-policy-bundle-1.140/src/accredited/HARICAGEANTTLSECC1.info --- igtf-policy-bundle-1.133/src/accredited/HARICAGEANTTLSECC1.info 2025-02-11 20:08:01.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HARICAGEANTTLSECC1.info 2026-03-25 13:54:39.000000000 +0000 @@ -9,6 +9,6 @@ email = tcs-pma@lists.geant.org requires = HARICATLSECCRootCA2021 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = CC:73:33:46:67:05:F1:43:BE:7D:76:DD:B8:E7:74:40:7A:3D:91:C8 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS ECC 1" diff -Nru igtf-policy-bundle-1.133/src/accredited/HARICAGEANTTLSRSA1.info igtf-policy-bundle-1.140/src/accredited/HARICAGEANTTLSRSA1.info --- igtf-policy-bundle-1.133/src/accredited/HARICAGEANTTLSRSA1.info 2025-02-11 20:08:02.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HARICAGEANTTLSRSA1.info 2026-03-25 13:54:39.000000000 +0000 @@ -9,6 +9,6 @@ email = tcs-pma@lists.geant.org requires = HARICATLSRSARootCA2021 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = BE:7F:0B:36:F8:8A:22:DD:DE:D3:62:DB:9A:F7:9C:8E:65:82:B9:19 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=GEANT TLS RSA 1" diff -Nru igtf-policy-bundle-1.133/src/accredited/HARICAOVTLSECC.info igtf-policy-bundle-1.140/src/accredited/HARICAOVTLSECC.info --- igtf-policy-bundle-1.133/src/accredited/HARICAOVTLSECC.info 2025-02-11 20:08:02.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HARICAOVTLSECC.info 2026-03-25 13:54:39.000000000 +0000 @@ -8,6 +8,6 @@ email = tcs-pma@lists.geant.org requires = HARICATLSECCRootCA2021 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 15:5C:A9:53:5D:FE:9B:16:3E:20:1E:71:7F:C9:B0:DE:1E:49:FD:2C subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS ECC" diff -Nru igtf-policy-bundle-1.133/src/accredited/HARICAOVTLSRSA.info igtf-policy-bundle-1.140/src/accredited/HARICAOVTLSRSA.info --- igtf-policy-bundle-1.133/src/accredited/HARICAOVTLSRSA.info 2025-02-11 20:08:03.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HARICAOVTLSRSA.info 2026-03-25 13:54:39.000000000 +0000 @@ -8,6 +8,6 @@ email = tcs-pma@lists.geant.org requires = HARICATLSRSARootCA2021 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 0E:B2:CA:9D:D9:89:CF:6E:A0:89:EF:48:10:05:80:E7:5F:E4:52:90 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA OV TLS RSA" diff -Nru igtf-policy-bundle-1.133/src/accredited/HARICATLSECCRootCA2021.info igtf-policy-bundle-1.140/src/accredited/HARICATLSECCRootCA2021.info --- igtf-policy-bundle-1.133/src/accredited/HARICATLSECCRootCA2021.info 2025-02-11 20:08:03.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HARICATLSECCRootCA2021.info 2026-03-25 13:54:39.000000000 +0000 @@ -8,7 +8,7 @@ email = tcs-pma@lists.geant.org requires = HellenicAcademicandResearchInstitutionsECCRootCA2015 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = BC:B0:C1:9D:E9:98:92:70:19:38:57:E9:8D:A7:B4:5D:6E:EE:01:48 subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS ECC Root CA 2021" diff -Nru igtf-policy-bundle-1.133/src/accredited/HARICATLSRSARootCA2021.info igtf-policy-bundle-1.140/src/accredited/HARICATLSRSARootCA2021.info --- igtf-policy-bundle-1.133/src/accredited/HARICATLSRSARootCA2021.info 2025-02-11 20:08:04.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HARICATLSRSARootCA2021.info 2026-03-25 13:54:40.000000000 +0000 @@ -8,7 +8,7 @@ email = tcs-pma@lists.geant.org requires = HellenicAcademicandResearchInstitutionsRootCA2015 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 02:2D:05:82:FA:88:CE:14:0C:06:79:DE:7F:14:10:E9:45:D7:A5:6D subjectdn = "/C=GR/O=Hellenic Academic and Research Institutions CA/CN=HARICA TLS RSA Root CA 2021" diff -Nru igtf-policy-bundle-1.133/src/accredited/HPCI.crl_url igtf-policy-bundle-1.140/src/accredited/HPCI.crl_url --- igtf-policy-bundle-1.133/src/accredited/HPCI.crl_url 2025-02-11 20:08:04.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HPCI.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://www.hpci.nii.ac.jp/ca/hpcica.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/HPCI.info igtf-policy-bundle-1.140/src/accredited/HPCI.info --- igtf-policy-bundle-1.133/src/accredited/HPCI.info 2025-02-11 20:08:04.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HPCI.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,13 +0,0 @@ -# -# @(#)$Id: 61cd35bd.info,v 1.2 2014/09/01 09:07:18 pmacvsdg Exp $ -# -alias = HPCI -crl_url = http://www.hpci.nii.ac.jp/ca/hpcica.crl -ca_url = https://www.hpci.nii.ac.jp/ca/hpcica.pem -email = hpci-ca-support@nii.ac.jp -status = accredited:mics -url = https://www.hpci.nii.ac.jp/ca/ -policy_url = https://www.hpci.nii.ac.jp/ca/CP_CPS.html -version = 1.133 -sha1fp.0 = AD:4A:2B:02:11:0D:E3:0A:E0:41:22:02:83:F7:A5:54:EA:43:CC:3E -subjectdn = "/C=JP/O=NII/OU=HPCI/CN=HPCI CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/HPCI.namespaces igtf-policy-bundle-1.140/src/accredited/HPCI.namespaces --- igtf-policy-bundle-1.133/src/accredited/HPCI.namespaces 2025-02-11 20:08:04.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HPCI.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,13 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)61cd35bd.namespaces -# CA alias : -# subord_of: -# subjectDN: /C=JP/O=NII/OU=HPCI/CN=HPCI CA -# hash : 61cd35bd -# (generated automatically from 61cd35bd.signing_policy) -# -TO Issuer "/C=JP/O=NII/OU=HPCI/CN=HPCI CA" \ - PERMIT Subject "/C=JP/O=NII/OU=HPCI/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/HPCI.pem igtf-policy-bundle-1.140/src/accredited/HPCI.pem --- igtf-policy-bundle-1.133/src/accredited/HPCI.pem 2025-02-11 20:08:04.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HPCI.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,20 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDVjCCAj6gAwIBAgIBATANBgkqhkiG9w0BAQsFADA8MQswCQYDVQQGEwJKUDEM -MAoGA1UEChMDTklJMQ0wCwYDVQQLEwRIUENJMRAwDgYDVQQDEwdIUENJIENBMB4X -DTEyMDgwOTA2MTIyNFoXDTMyMDgwNzAwMDAwMFowPDELMAkGA1UEBhMCSlAxDDAK -BgNVBAoTA05JSTENMAsGA1UECxMESFBDSTEQMA4GA1UEAxMHSFBDSSBDQTCCASIw -DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAN264tGoH5JdgQ1qF3/8nA6CB86b -Rhfa67qlm4RWvAl2BmZ6ws0nuI6cmVcUKfs4HftAJYYN6Ch1p6lGdUwue/5iBliA -4TS8zi/5WZq5ciH/ffG8NF1+TdEMZ1q9LRkrYSWQHPrzo1QY/5IX7QvOakeHyMTA -s+Irr1mRz2OwHj6Nu9fCAg1D3d1a36fEuKs3krM5yYSz9cBbinNNMe+HoV7YcjJ9 -1lJhBVD7gCHOOjS0DXb2ed/kjjW+I9w7h9XS6Xl14yXik0GRMSeaBKbEK8E9npgg -GvZZtItLOTFcJQVz3vkS8ZEOuxPgGgiio32a5gnSKCnDOSVp1FluZwRo7fUCAwEA -AaNjMGEwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgw -FoAUoD6uD5bj/URTMLH+Tg+eZRLcTZUwHQYDVR0OBBYEFKA+rg+W4/1EUzCx/k4P -nmUS3E2VMA0GCSqGSIb3DQEBCwUAA4IBAQB2H9BiPQ9pO+NUKmQnt12e6N0wH5kC -WBZ0TXnuPSdCTNtaV87lLPwjsMXdc5TpiEGNCl80Q9w62M32y/JwDgNhNFp6pho/ -A21kyquiLU3+vitbCIYHmkz8Z5T1+mmVAAIBllUWgnQTyvs5kQLsHaOJQOkgkuOo -ANVOjj1H72lpUzLIRe+yF2T4JaA5YV6uN4uyBfYQKdUav/ekBEAEupOCvaHUCJWZ -FyqX3mIQ3Q+LuD9Lnvs0efFmeoKmUcu4qws6DeGogQ7se/WWLJbZzm12ySS/YZI3 -EoqLKab2QLw3C0J8rSiLDkS95kK3fmsYfXekPkKAVacslboj1INFL3z9 ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/HPCI.signing_policy igtf-policy-bundle-1.140/src/accredited/HPCI.signing_policy --- igtf-policy-bundle-1.133/src/accredited/HPCI.signing_policy 2025-02-11 20:08:04.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HPCI.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,33 +0,0 @@ -# ca-signing-policy.conf, see ca-signing-policy.doc for more information -# -# This is the configuration file describing the policy for what CAs are -# allowed to sign whoses certificates. -# -# This file is parsed from start to finish with a given CA and subject -# name. -# subject names may include the following wildcard characters: -# * Matches any number of characters. -# ? Matches any single character. -# -# CA names must be specified (no wildcards). Names containing whitespaces -# must be included in single quotes, e.g. 'Certification Authority'. -# Names must not contain new line symbols. -# The value of condition attribute is represented as a set of regular -# expressions. Each regular expression must be included in double quotes. -# -# This policy file dictates the following policy: -# -The Globus CA can sign Globus certificates -# -# Format: -#------------------------------------------------------------------------ -# token type | def.authority | value -#--------------|---------------|----------------------------------------- -# EACL entry #1| - - access_id_CA X509 '/C=JP/O=NII/OU=HPCI/CN=HPCI CA' - - pos_rights globus CA:sign - - cond_subjects globus '"/C=JP/O=NII/OU=HPCI/*"' - -# end of EACL diff -Nru igtf-policy-bundle-1.133/src/accredited/HellasGrid-CA-2016.info igtf-policy-bundle-1.140/src/accredited/HellasGrid-CA-2016.info --- igtf-policy-bundle-1.133/src/accredited/HellasGrid-CA-2016.info 2025-02-11 20:08:05.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HellasGrid-CA-2016.info 2026-03-25 13:54:40.000000000 +0000 @@ -9,6 +9,6 @@ policy_url = https://www.grid.auth.gr/pki/hellasgrid-ca/documents/cps/HellasGrid-CA-CP-CPS.pdf email = ca@hellasgrid.gr status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 01:D3:A5:3C:4C:DF:9C:D9:10:3B:1B:8B:D4:CB:D1:7D:42:73:2C:5F subjectdn = "/C=GR/O=HellasGrid/OU=Certification Authorities/CN=HellasGrid CA 2016" diff -Nru igtf-policy-bundle-1.133/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.info igtf-policy-bundle-1.140/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.info --- igtf-policy-bundle-1.133/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.info 2025-02-11 20:08:05.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HellenicAcademicandResearchInstitutionsECCRootCA2015.info 2026-03-25 13:54:40.000000000 +0000 @@ -7,6 +7,6 @@ url = https://www.harica.gr/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 9F:F1:71:8D:92:D5:9A:F3:7D:74:97:B4:BC:6F:84:68:0B:BA:B6:66 subjectdn = "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions ECC RootCA 2015" diff -Nru igtf-policy-bundle-1.133/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.info igtf-policy-bundle-1.140/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.info --- igtf-policy-bundle-1.133/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.info 2025-02-11 20:08:06.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/HellenicAcademicandResearchInstitutionsRootCA2015.info 2026-03-25 13:54:40.000000000 +0000 @@ -7,6 +7,6 @@ url = https://www.harica.gr/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 01:0C:06:95:A6:98:19:14:FF:BF:5F:C6:B0:B6:95:EA:29:E9:12:A6 subjectdn = "/C=GR/L=Athens/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2015" diff -Nru igtf-policy-bundle-1.133/src/accredited/IGCA2.info igtf-policy-bundle-1.140/src/accredited/IGCA2.info --- igtf-policy-bundle-1.133/src/accredited/IGCA2.info 2025-02-11 20:08:06.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/IGCA2.info 2026-03-25 13:54:40.000000000 +0000 @@ -7,6 +7,6 @@ email = igca@cdac.in status = accredited:classic url = http://ca.garudaindia.in/ -version = 1.133 +version = 1.140 sha1fp.0 = 54:32:0D:7D:57:6B:7F:B3:05:DF:FF:B5:50:E5:82:F8:46:39:7A:21 subjectdn = "/DC=IN/DC=GARUDAINDIA/CN=Indian Grid Certification Authority 2" diff -Nru igtf-policy-bundle-1.133/src/accredited/IHEP-2013.info igtf-policy-bundle-1.140/src/accredited/IHEP-2013.info --- igtf-policy-bundle-1.133/src/accredited/IHEP-2013.info 2025-02-11 20:08:07.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/IHEP-2013.info 2026-03-25 13:54:40.000000000 +0000 @@ -8,6 +8,6 @@ email = ihepca@maillist.ihep.ac.cn status = accredited:classic url = https://cagrid.ihep.ac.cn/ -version = 1.133 +version = 1.140 sha1fp.0 = B3:24:D7:42:95:36:B2:CC:1E:F9:75:5C:C4:D2:47:7F:CE:E0:B8:19 subjectdn = "/C=CN/O=HEP/CN=Institute of High Energy Physics Certification Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/IRAN-GRID-GCG-G2.info igtf-policy-bundle-1.140/src/accredited/IRAN-GRID-GCG-G2.info --- igtf-policy-bundle-1.133/src/accredited/IRAN-GRID-GCG-G2.info 2025-02-11 20:08:07.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/IRAN-GRID-GCG-G2.info 2026-03-25 13:54:41.000000000 +0000 @@ -8,6 +8,6 @@ email = ca-manager@ipm.ir status = accredited:classic url = http://irangrid.ipm.ac.ir/ -version = 1.133 +version = 1.140 sha1fp.0 = 9D:3B:E5:46:9D:2E:E4:AB:57:DD:36:F4:ED:24:D7:70:41:C6:76:69 subjectdn = "/C=IR/O=IPM/OU=GCG/CN=IRAN-GRID-G2 CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/InCommon-RSA-IGTF-Server-CA-3.info igtf-policy-bundle-1.140/src/accredited/InCommon-RSA-IGTF-Server-CA-3.info --- igtf-policy-bundle-1.133/src/accredited/InCommon-RSA-IGTF-Server-CA-3.info 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/InCommon-RSA-IGTF-Server-CA-3.info 2026-03-25 13:54:41.000000000 +0000 @@ -6,6 +6,6 @@ requires = USERTrustRSACertificationAuthority email = admin@incommon.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 6A:F9:A4:7F:00:4F:34:14:35:0D:A7:76:BF:9C:D3:A2:17:D1:D0:16 subjectdn = "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 3" diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK.crl_url igtf-policy-bundle-1.140/src/accredited/KEK.crl_url --- igtf-policy-bundle-1.133/src/accredited/KEK.crl_url 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://gridca.kek.jp/repository/617ff41b.r0 diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK.info igtf-policy-bundle-1.140/src/accredited/KEK.info --- igtf-policy-bundle-1.133/src/accredited/KEK.info 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,8 +0,0 @@ -alias = KEK -crl_url = http://gridca.kek.jp/repository/617ff41b.r0 -email = kekgridca-contact@ml.post.kek.jp -status = accredited:classic -url = https://gridca.kek.jp/ -version = 1.133 -sha1fp.0 = 7F:F3:8B:69:A2:9A:1F:F2:EA:FF:99:7F:EB:40:9B:B7:DD:47:5A:1D -subjectdn = "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK.namespaces igtf-policy-bundle-1.140/src/accredited/KEK.namespaces --- igtf-policy-bundle-1.133/src/accredited/KEK.namespaces 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,13 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)617ff41b.signing_policy.namespaces -# CA alias : KEK -# subord_of: -# subjectDN: /C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority -# hash : 617ff41b.signing_policy -# (generated automatically from 617ff41b.signing_policy) -# -TO Issuer "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority" \ - PERMIT Subject "/C=JP/O=KEK/OU=CRC/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK.pem igtf-policy-bundle-1.140/src/accredited/KEK.pem --- igtf-policy-bundle-1.133/src/accredited/KEK.pem 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,21 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDfzCCAmegAwIBAgIBATANBgkqhkiG9w0BAQUFADBSMQswCQYDVQQGEwJKUDEM -MAoGA1UEChMDS0VLMQwwCgYDVQQLEwNDUkMxJzAlBgNVBAMTHktFSyBHUklEIENl -cnRpZmljYXRlIEF1dGhvcml0eTAeFw0wNTExMjUwNjIwMDFaFw0yNTExMjUwMDAw -MDBaMFIxCzAJBgNVBAYTAkpQMQwwCgYDVQQKEwNLRUsxDDAKBgNVBAsTA0NSQzEn -MCUGA1UEAxMeS0VLIEdSSUQgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIIBIjANBgkq -hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzwPVQNq4DkabmieAS+mRrMrKomjY2z1d -CF7HNHys0smqCBwkMKg6AEsddtJP6NyNO3KaknO756MI4K31xgDdTQpkQWkPqIGT -pSlMY8xxH1AVe4KDg9AxB5AkHYSxjah3dT2sm9ZQHjPtXGMFRzjReKSgZWIWteF+ -SdWpqhuxo8oYDzot7ZqIJnV2Dr9R3mLTU9Lslv5ZCult/iX5XKSkSC+3oLps5IKw -/7ICgealZluaWjye61BDBpREQfjTHwZb+GSYzngGrJzedekOZ7ILq9tECojmNq7A -7FyVeG793UPhOJ69JP4oFsrQrG6+aGcaIui70QCpWaOldThnynzkDQIDAQABo2Aw -XjAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAfBgNVHSMEGDAWgBT1lIMe -2Yv88d6Z4cYX4nxg0JummzAdBgNVHQ4EFgQU9ZSDHtmL/PHemeHGF+J8YNCbppsw -DQYJKoZIhvcNAQEFBQADggEBADKvGDLXIMPQgtSiqvLLqSOfNgedj9N+5DRxQLlR -iNxJxFt8ol2jZ92JgkETDWgR+RYz3oG26/uPpVi6jxx24Wru4h6A5OVLvKmKBd1+ -WezShcPY3CFowrA90lsWD4XQmgVl4NyQYViMEbSk+oWx5kRrvzf4I0B2yq/wJSkJ -/ysNRHT0o50MwDOBt0pZs5RoJmbYu2pFXUiygdmAaImIAMfEcP7UT3CUJiGX1dwN -uKkT7zG8VwAaSMpVtTQuE+2+sH2ZJnzc6fJYZlgX4VjmZYh5bpQsF+sxqd2p+qmk -5Bd+wx7iy8WUmCnV8Yl+u69wcnNH1boP/5qjGvlYtkopa0A= ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK.signing_policy igtf-policy-bundle-1.140/src/accredited/KEK.signing_policy --- igtf-policy-bundle-1.133/src/accredited/KEK.signing_policy 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,33 +0,0 @@ -# ca-signing-policy.conf, see ca-signing-policy.doc for more information -# -# This is the configuration file describing the policy for what CAs are -# allowed to sign whoses certificates. -# -# This file is parsed from start to finish with a given CA and subject -# name. -# subject names may include the following wildcard characters: -# * Matches any number of characters. -# ? Matches any single character. -# -# CA names must be specified (no wildcards). Names containing whitespaces -# must be included in single quotes, e.g. 'Certification Authority'. -# Names must not contain new line symbols. -# The value of condition attribute is represented as a set of regular -# expressions. Each regular expression must be included in double quotes. -# -# This policy file dictates the following policy: -# -The Globus CA can sign Globus certificates -# -# Format: -#------------------------------------------------------------------------ -# token type | def.authority | value -#--------------|---------------|----------------------------------------- -# EACL entry #1| - - access_id_CA X509 '/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority' - - pos_rights globus CA:sign - - cond_subjects globus '"/C=JP/O=KEK/OU=CRC/*"' - -# end of EACL diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK2024.crl_url igtf-policy-bundle-1.140/src/accredited/KEK2024.crl_url --- igtf-policy-bundle-1.133/src/accredited/KEK2024.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK2024.crl_url 2026-03-25 13:54:41.000000000 +0000 @@ -0,0 +1 @@ +http://gridca2024.kek.jp/repository/e7a6d5cc.r0 diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK2024.info igtf-policy-bundle-1.140/src/accredited/KEK2024.info --- igtf-policy-bundle-1.133/src/accredited/KEK2024.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK2024.info 2026-03-25 13:54:41.000000000 +0000 @@ -0,0 +1,10 @@ +# @(#)KEK2024.info - added 20250912 +alias = KEK2024 +crl_url = http://gridca2024.kek.jp/repository/e7a6d5cc.r0 +ca_url = https://gridca2024.kek.jp/repository/e7a6d5cc.0 +email = kekgridca-contact@ml.post.kek.jp +status = accredited:classic +url = https://gridca2024.kek.jp/ +version = 1.140 +sha1fp.0 = 59:27:B9:D9:F3:4F:DE:6B:26:3B:79:91:CE:40:CB:48:76:AD:7F:34 +subjectdn = "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority2024" diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK2024.namespaces igtf-policy-bundle-1.140/src/accredited/KEK2024.namespaces --- igtf-policy-bundle-1.133/src/accredited/KEK2024.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK2024.namespaces 2026-03-25 13:54:41.000000000 +0000 @@ -0,0 +1,13 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)KEK2024.signing_policy.namespaces +# CA alias : KEK2024 +# subord_of: +# subjectDN: /C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority2024 +# hash : KEK2024.signing_policy +# (generated automatically from KEK2024.signing_policy) +# +TO Issuer "/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority2024" \ + PERMIT Subject "/C=JP/O=KEK/OU=CRC/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK2024.pem igtf-policy-bundle-1.140/src/accredited/KEK2024.pem --- igtf-policy-bundle-1.133/src/accredited/KEK2024.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK2024.pem 2026-03-25 13:54:41.000000000 +0000 @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFhzCCA2+gAwIBAgIBATANBgkqhkiG9w0BAQ0FADBWMQswCQYDVQQGEwJKUDEM +MAoGA1UEChMDS0VLMQwwCgYDVQQLEwNDUkMxKzApBgNVBAMTIktFSyBHUklEIENl +cnRpZmljYXRlIEF1dGhvcml0eTIwMjQwHhcNMjUwMTA5MDAyNzM0WhcNMzUwMTA3 +MDAyNzM0WjBWMQswCQYDVQQGEwJKUDEMMAoGA1UEChMDS0VLMQwwCgYDVQQLEwND +UkMxKzApBgNVBAMTIktFSyBHUklEIENlcnRpZmljYXRlIEF1dGhvcml0eTIwMjQw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDjSLwX0WwnztiC/aYwE8g7 +aTneFsCA0an+hOSRDaqBq6d/NP3b69Walow0hAbbbixhp9MqS4or14XQ5Of8BBAJ +nKrSImrk0CFv9kjyknKMyTkhQhwpGMyZBK7aKJX/5rg2Te+LJfI3HBwbf5jCHl4j +ahok2ytkhmAI/q/FVK3D6RfsC7v8cCU/jUR0TLLQxhKx6WD7btXo1AEsVgrhLV61 +tM3UT00SK5f/q7E7ZiYKzFVijtB/wGmuf2NtE2mfH5JkIs7eHavdDeA6oDTBvbBB +Ts8SA2lpc4TDSpz7G+2Zc200b84o7hFjg858M31QSvfqI3+r5QuEw8tEFYriSH+M +KquZuHhiHYOf82XASN3yLF7i4bMs3NYHu5AGYhGkOi/A2qeVYcfV+GRYle/Farc1 +R7koOhemLUdy2Y2P6V3CBZ0V1SCNAydDBpjg6BW74m5WHdTV0ePgOVB3QhxguBpG +rSdC0a19CiqFkp/LjVcLlITVgFo1EIfZwK/nt9ryp3p0waiiUVON8KGcq1QQyHbc +saZJALDzh2ubNEoQSnINstFzDQggO/HCrVQnfEDWHcarGPQU1tEl10SXVPp9EMee +zs7LQNysu89Hfn1+tDcn2cqwORHYApQIFY0lx9PFLpJ+hmzBiXJlqPKdXiSL8y4v +hAVXwHET1zPlQ7bYx1fGgwIDAQABo2AwXjAPBgNVHRMBAf8EBTADAQH/MAsGA1Ud +DwQEAwIBBjAfBgNVHSMEGDAWgBT0qOhrtRLbdNvICHGWkSyLo6JejzAdBgNVHQ4E +FgQU9Kjoa7US23TbyAhxlpEsi6OiXo8wDQYJKoZIhvcNAQENBQADggIBAAvH+55V +6QATrg7dpCAaQBZ1kyOXPAqrXkbVYvxg5juxQ4Rb4iFnc2zO9N5gd5UT2cMbb9aw +a1epp4G/ux2ElV2zHdCCWp2s1pJBrdaC6fxb3n5uI0bZw1oFJg+IOhsOMeBcENmV +g1WfmLF+XbgP+wWmFyMpeoeWXIWTMTq5+6+5Nno1Vo8F2w8gzOBJbM1h2Oyp+Ali +234lJ1uQibfjcynyONuzygvdlY/B5khM/zwxDBXZqClvikl4H7hacegOv5y21ixs +HmaPZ8URqt9jTOOXpiUpIxXUqOIqpbDS47tuEc2RcqO/Syhm4UlEHIgLRUFaSUdU +JIkHHtcBTW4H44qQkLGNwJ+FC3al++muE7Nq+ZA7dsi5Z4eambeYMr6DqLlsmuWJ +5KesRa59u+nfTa/skN5N+FBO28QO2tfRF9MUkP+cLkfHGLIvoHnqBYswn9H3H9ZE +B6yJJBjafPUir10LmJW/0nl5sGAviAKdj5ocOQXFtldSuxNRzeY9w09awUZQE8Wy +bdofsnXue8HgfYVfzmedLxiHTQtFwYZZ/WZr06CvbNM/nf0Hm/VZWNtk3OID296V +koVL+hluC2L8GVYo0yTgyMK+HTZSCPRvYWBoN12Vvh5BxqhT37b7FwCDFfR1NQEf +BVRvkb8aLSzV5IGneN6fiTtN8TekEFMlnxzk +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/KEK2024.signing_policy igtf-policy-bundle-1.140/src/accredited/KEK2024.signing_policy --- igtf-policy-bundle-1.133/src/accredited/KEK2024.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KEK2024.signing_policy 2026-03-25 13:54:41.000000000 +0000 @@ -0,0 +1,4 @@ +# @(#)KEK2024 signing policy + access_id_CA X509 '/C=JP/O=KEK/OU=CRC/CN=KEK GRID Certificate Authority2024' + pos_rights globus CA:sign + cond_subjects globus '"/C=JP/O=KEK/OU=CRC/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/KISTIv3.info igtf-policy-bundle-1.140/src/accredited/KISTIv3.info --- igtf-policy-bundle-1.133/src/accredited/KISTIv3.info 2025-02-11 20:08:09.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/KISTIv3.info 2026-03-25 13:54:41.000000000 +0000 @@ -4,6 +4,6 @@ status = accredited:classic url = http://ca.gridcenter.or.kr/ policy_url = http://ca.gridcenter.or.kr/cps/KISTI-CA-CPCPS-3.0.pdf -version = 1.133 +version = 1.140 sha1fp.0 = 06:52:34:EE:81:0A:E5:9C:43:68:54:84:8C:8A:D4:DF:0D:75:A7:45 subjectdn = "/C=KR/O=KISTI/CN=KISTI Certification Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/MREN-CA.info igtf-policy-bundle-1.140/src/accredited/MREN-CA.info --- igtf-policy-bundle-1.133/src/accredited/MREN-CA.info 2025-02-11 20:08:09.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/MREN-CA.info 2026-03-25 13:54:41.000000000 +0000 @@ -5,6 +5,6 @@ crl_url = http://mren-ca.ucg.ac.me/ca/crl-v2.crl email = mren-ca@ac.me status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = B5:3C:77:51:15:8F:BD:D4:B5:74:C0:02:E2:8C:EC:8E:02:33:99:6A subjectdn = "/DC=me/DC=ac/DC=MREN/CN=MREN-CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/MaGrid.info igtf-policy-bundle-1.140/src/accredited/MaGrid.info --- igtf-policy-bundle-1.133/src/accredited/MaGrid.info 2025-02-11 20:08:10.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/MaGrid.info 2026-03-25 13:54:42.000000000 +0000 @@ -5,6 +5,6 @@ ca_url = http://ra.magrid.ma/pub/cacert/cacert.pem email = magrid@cnrst.ma status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 65:AD:EF:26:0B:4A:5C:05:72:3F:B6:92:99:0B:96:CA:7B:99:6E:F4 subjectdn = "/C=MA/O=MaGrid/CN=MaGrid CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/NIKHEF.info igtf-policy-bundle-1.140/src/accredited/NIKHEF.info --- igtf-policy-bundle-1.133/src/accredited/NIKHEF.info 2025-02-11 20:08:10.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/NIKHEF.info 2026-03-25 13:54:42.000000000 +0000 @@ -9,6 +9,6 @@ email = ca@dutchgrid.nl status = accredited:classic url = http://ca.dutchgrid.nl/medium/ -version = 1.133 +version = 1.140 sha1fp.0 = F8:4D:ED:9B:42:34:58:F4:3B:AF:BF:0A:6E:1A:84:5C:18:34:5A:A3 subjectdn = "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth" diff -Nru igtf-policy-bundle-1.133/src/accredited/NorduGrid-2015.info igtf-policy-bundle-1.140/src/accredited/NorduGrid-2015.info --- igtf-policy-bundle-1.133/src/accredited/NorduGrid-2015.info 2025-02-11 20:08:11.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/NorduGrid-2015.info 2026-03-25 13:54:42.000000000 +0000 @@ -5,6 +5,6 @@ email = ca@nordugrid.org crl_url = http://ca.nordugrid.org/NorduGrid-2015.crl status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 7D:4E:B2:72:27:1D:CB:FF:04:67:59:F0:60:27:22:2B:B8:02:98:EF subjectdn = "/O=Grid/O=NorduGrid/CN=NorduGrid Certification Authority 2015" diff -Nru igtf-policy-bundle-1.133/src/accredited/PK-Grid-2007.info igtf-policy-bundle-1.140/src/accredited/PK-Grid-2007.info --- igtf-policy-bundle-1.133/src/accredited/PK-Grid-2007.info 2025-02-11 20:08:11.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/PK-Grid-2007.info 2026-03-25 13:54:42.000000000 +0000 @@ -6,6 +6,6 @@ url = http://www.ncp.edu.pk/pk-grid-ca/ email = pkgrid-ca@ncp.edu.pk status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = A9:39:DC:47:B9:AC:C9:22:88:59:DC:25:C7:62:AE:24:CC:89:37:45 subjectdn = "/C=PK/O=NCP/CN=PK-GRID-CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/PKIUNAMgrid.info igtf-policy-bundle-1.140/src/accredited/PKIUNAMgrid.info --- igtf-policy-bundle-1.133/src/accredited/PKIUNAMgrid.info 2025-02-11 20:08:12.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/PKIUNAMgrid.info 2026-03-25 13:54:42.000000000 +0000 @@ -9,5 +9,5 @@ email = camanager@unam.mx status = accredited:classic sha1fp.0 = 1D:05:8F:6A:75:5A:A8:36:12:88:22:D2:8A:3A:31:EA:6C:2B:5A:B8 -version = 1.133 +version = 1.140 subjectdn = "/C=MX/O=UNAM/OU=UNAMgrid/CN=PKIUNAMgrid" diff -Nru igtf-policy-bundle-1.133/src/accredited/PolishGrid-2019.info igtf-policy-bundle-1.140/src/accredited/PolishGrid-2019.info --- igtf-policy-bundle-1.133/src/accredited/PolishGrid-2019.info 2025-02-11 20:08:12.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/PolishGrid-2019.info 2026-03-25 13:54:42.000000000 +0000 @@ -7,6 +7,6 @@ crl_url = http://www.man.poznan.pl/plgrid-ca/2019/crl.crl ca_url = http://www.man.poznan.pl/plgrid-ca/PolishGridCA-2019.pem status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = DD:D9:1C:6A:B8:BE:B5:B3:98:F0:81:F1:F2:35:56:4E:07:07:15:09 subjectdn = "/C=PL/O=GRID/CN=Polish Grid CA 2019" diff -Nru igtf-policy-bundle-1.133/src/accredited/RCauth-Pilot-ICA-G1.info igtf-policy-bundle-1.140/src/accredited/RCauth-Pilot-ICA-G1.info --- igtf-policy-bundle-1.133/src/accredited/RCauth-Pilot-ICA-G1.info 2025-02-11 20:08:13.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/RCauth-Pilot-ICA-G1.info 2026-03-25 13:54:43.000000000 +0000 @@ -10,6 +10,6 @@ email = ca@rcauth.eu status = accredited:iota url = https://www.rcauth.eu/ -version = 1.133 -sha1fp.0 = 8B:F3:1F:7D:46:57:B4:19:F5:D7:CB:A8:17:4E:E6:F9:C9:18:29:4D +version = 1.140 +sha1fp.0 = 44:1C:38:93:75:B0:FA:DD:13:D9:75:E4:FE:01:2E:7E:24:55:FC:D0 subjectdn = "/DC=eu/DC=rcauth/O=Certification Authorities/CN=Research and Collaboration Authentication Pilot G1 CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/RCauth-Pilot-ICA-G1.pem igtf-policy-bundle-1.140/src/accredited/RCauth-Pilot-ICA-G1.pem --- igtf-policy-bundle-1.133/src/accredited/RCauth-Pilot-ICA-G1.pem 2025-02-11 20:08:13.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/RCauth-Pilot-ICA-G1.pem 2026-03-25 13:54:43.000000000 +0000 @@ -1,8 +1,8 @@ -----BEGIN CERTIFICATE----- -MIIFSDCCAzCgAwIBAgIQCfXXVo6J6IfYFlP+q8eE4jANBgkqhkiG9w0BAQsFADBs +MIIFSDCCAzCgAwIBAgIQBXdruv+/Hoakasql2WCLmDANBgkqhkiG9w0BAQsFADBs MRIwEAYKCZImiZPyLGQBGRYCbmwxGTAXBgoJkiaJk/IsZAEZFglkdXRjaGdyaWQx IjAgBgNVBAoTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxFzAVBgNVBAMTDkRD -QSBSb290IEcxIENBMB4XDTE2MDIwMTAwMDAwMFoXDTI2MDEzMTIzNTk1OVowgZAx +QSBSb290IEcxIENBMB4XDTE2MDIwMTAwMDAwMFoXDTM2MDEzMTIzNTk1OVowgZAx EjAQBgoJkiaJk/IsZAEZFgJldTEWMBQGCgmSJomT8ixkARkWBnJjYXV0aDEiMCAG A1UEChMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczE+MDwGA1UEAxM1UmVzZWFy Y2ggYW5kIENvbGxhYm9yYXRpb24gQXV0aGVudGljYXRpb24gUGlsb3QgRzEgQ0Ew @@ -16,16 +16,16 @@ VR0OBBYEFB+9RNPNxNmQF+n3NJhgo0RbfQZHMB8GA1UdIwQYMBaAFFJ8L7KCWUmm 8Agd72gFoTUyiignMBkGA1UdIAQSMBAwDgYMKwYBBAHRQgQCBwEBMD8GA1UdHwQ4 MDYwNKAyoDCGLmh0dHA6Ly9jcmwuZHV0Y2hncmlkLm5sL2RjYXJvb3QvZzEvY3Js -L2NybC5jcmwwDQYJKoZIhvcNAQELBQADggIBACbJqxl4B08Hlt8BTZq8F9Fa2KHn -UutH5H8Nt0KmILgLNvPjr2YGv8dDurHoREXcH/9ZcH+YFZ6u+Xtoz1CEKgZDVqjQ -m356cAdG7RKSa1317itABNteQ2U8QPbnIcdoX3owDDUIaJe4di51QpabPeX3etHh -jGSktJ2Ee1AAhP6CIIGE+tRJMeBepo/2gVZbCHn39bx5He+7ue862F67dLpWJ+UP -G3eUvsTjL/pWBgcuNNdD6EXlWa0a5WECdtBZwTWM4GJUa1d0w53qA/pwbUxjGIFx -fYDE2EneQmkujT7HgGpYXOSuhhnz1dfzAO3XOc0M9AuLW8/zsEEg6Yds5CQmOPRD -ABiyhjKVZUtls8PFyQNQcIrW18zmqZ3eiFOruSjvnY3i4pthrmrIuFZJKMFTP9jK -14OLqCZ3QrUBTh4WyCb9KURbVINiKkNSAVJII6ANfciOxAblmTkNdjZE/+ioKpxV -E4jf2XiFr4djlXoEhIjM/oC2R8sl1fa0tX/CwPp7PKx/TSInSeLw0LBOlFB/ntTE -JvdZnbPIlFGlSQd9vIbdz3k3Fh9HmDtsEkx5pIFc/Cq1ZJY7FtPVGzFroewC+Aoq -gpmByW/hJ0Fn0/wZuC8DFU02QHIW3ES7AsChzyzxxxj5ZflXhFPGUIzhvl23jz/L -k1pn+KgTlIxaOMqO +L2NybC5jcmwwDQYJKoZIhvcNAQELBQADggIBAAQ3PdWBKNoG8+jnWo7LZc1ip389 +PiNJl/03m5T0F59AJ7Qs4VTuze1Ixo0Beo6/Ukz5ZGm+BN3kTAtiTsyafInOKYwB +gW6MRNMo9UiDMiY2xkLmu90TJwxcMWknd5nBCX6Ly32lbKSG/iwUrurlQo2bkRGd +tovQFOAYaUG9lbm0rk/ZVuje2bv6VWaGIfUj3PSjL6nOKhdY/GOl6xl2+Ocu755M +LMeTirLQJQkB2V/9aavnw5FeMjfHqdHPEXZcfDMoROhMMeioMmFQIEl/yuqbtMge +bt0fFfq2lMGA8J7atiiF7qKmSO3ML/aV6yCWWzna4FiWUdD26TvrYIu/xhvxRkKt +V0vQQnz9pQQ/3q2ILNRTOWMlrLxJL+yUroc8SBbgASd9QX+sOWYdLtTADM7bRfsa +bpI8JoiuwMZNVF0LAOflJ0VXAn0UfLhO5iMFro4ILp+25LyJeqZRAzbuNdd8mVjc +1bmdqpG46KAz3ovVum9s0JA8scunl58ikfzxotAxdp4L4x9nATouYm/LWUqeC8dD +J1sD/4OsMQ6q89vm/k2UmpGz8ElTb9TGuVezvNDHPjKQspX/SkD+5FFHbt/chg0G +ZIH5Vife83OWEKW23yQvRBfnUK3KEfYG5m8ZZm1Js7RdblWwcM/xkeHQob0ckElE +x3tRQA+ZtqyOc1t0 -----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/RDIG.info igtf-policy-bundle-1.140/src/accredited/RDIG.info --- igtf-policy-bundle-1.133/src/accredited/RDIG.info 2025-02-11 20:08:13.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/RDIG.info 2026-03-25 13:54:43.000000000 +0000 @@ -8,6 +8,6 @@ email = rdig-ca-support@grid.kiae.ru status = accredited:classic url = http://ca.grid.kiae.ru/RDIG/ -version = 1.133 +version = 1.140 sha1fp.0 = 69:94:15:0F:7D:8A:81:B2:4B:67:94:B6:B5:EF:F9:2E:63:A8:B4:21 subjectdn = "/C=RU/O=RDIG/CN=Russian Data-Intensive Grid CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.crl_url igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.crl_url --- igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.crl_url 2026-03-25 13:54:43.000000000 +0000 @@ -0,0 +1 @@ +http://reuna-ca.reuna.cl/crl/ica.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.info igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.info --- igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.info 2026-03-25 13:54:43.000000000 +0000 @@ -0,0 +1,13 @@ +# +# @(#)REUNA Issuing CA - C5 +# +alias = REUNA-ICA-C5 +url = http://reuna-ca.reuna.cl/ +ca_url = https://repository.emsign.com/certs/REUNAIssuingCAC5.crt +crl_url = http://reuna-ca.reuna.cl/crl/ica.crl +email = reuna-ca@reuna.cl +status = accredited:classic +requires = eMudhra-TrustedRootCAC5 +sha1fp.0 = 3F:AE:C8:AF:D4:EA:E5:BB:F5:25:60:58:CB:18:CF:8B:4B:59:F3:03 +version = 1.140 +subjectdn = "/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5" diff -Nru igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.namespaces igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.namespaces --- igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.namespaces 2026-03-25 13:54:43.000000000 +0000 @@ -0,0 +1,11 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5 +# CA alias : REUNA-ICA-C5 +# subord_of: /C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5 +# subjectDN: C=CL, O=REUNA CA, CN=REUNA Issuing CA - C5 +# +TO Issuer "/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5" \ + PERMIT Subject "/C=CL/O=REUNACA/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.pem igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.pem --- igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.pem 2026-03-25 13:54:43.000000000 +0000 @@ -0,0 +1,38 @@ +-----BEGIN CERTIFICATE----- +MIIGtDCCBJygAwIBAgIRAPGKi+3rjpK+BV1yIUrrDicwDQYJKoZIhvcNAQEMBQAw +SjELMAkGA1UEBhMCVVMxFTATBgNVBAoMDGVNdWRocmEgSW5jLjEkMCIGA1UEAwwb +ZW1TaWduIFRydXN0ZWQgUm9vdCBDQSAtIEM1MB4XDTI1MDMxMDA5MDkwOFoXDTM0 +MDEyMzA5MDkwOFowQDELMAkGA1UEBhMCQ0wxETAPBgNVBAoMCFJFVU5BIENBMR4w +HAYDVQQDDBVSRVVOQSBJc3N1aW5nIENBIC0gQzUwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQCrbpLnHuOcAYxPBmI+tnIFSCcXah12Wj2IprqCSDmwpCRq +2qr3rktxLWiCrmPxpvc1ZxQA2Zo5Nc/hrWXAVLxEZ55wakP8W72LtOyIx0xUWjUk +2DwVDGXNIWMuPs+drY7rdnbOck8JMgPvP2kJWVxqfLmtiEUVo6UQPLo+UcSyU4bx +g0LDlBB24Mt1yRPoQTKRsEuSHux/g4bmXZxw9NsWJhRsKXERHGuzcBdd6OUazvx5 +17unP+4W8Tcu73COTJnw5f7WrpxOZICihFyUvb5FiN1oN8r1F/96FRZz39EwV5VW +MNsiV31HXO6HfWm/mjl6/L9TjJ0mC37LipmS5pNBf08y0lQ57uo9JrsxL3uA+Vkz +CE2/xafFFbRVWugFbbcyvAOH0jDppY9hnPp/DK9wvBYHQtEvh1YqbzrIfCfZqcv2 +3EVNLBhBCpCSdmP/YhYqyM+XhNQIFpHXbpAyAvvWMCrxNM3EokUGnS1uEPGcugVy +EVJUNy6VmBaJFiX4zjXWuWQ0wMIYhuFk9UcWYjtPY3V2G6COf1ZMPQlCd8P+81Hx +bdBNBs4cLO+Z2BRskWLrFAo7eahol7YdoggoCGGarFjxg1XZEtg8TywQj6kcc2k+ +ber6qoPtTe1hAzT4cLRopkF436MLuZu8V99tM4vExqAeaaDrejzdMB0EbL1bhQID +AQABo4IBnTCCAZkwHwYDVR0jBBgwFoAUqK5ywkowEM6SG1mICKrSWvhckdEwHQYD +VR0OBBYEFLxXga206Z0xMt7kOcpapzxsGcFhMDMGA1UdJQQsMCoGCCsGAQUFBwMB +BggrBgEFBQcDAgYIKwYBBQUHAwQGCisGAQQBgjcKAwwwfgYDVR0gBHcwdTBABg4q +hkiG90wFBAICAQEBAjAuMCwGCCsGAQUFBwIBFiBodHRwOi8vcmV1bmEtY2EucmV1 +bmEuY2wvcG9saWN5LzAPBg0qhkiG90wFBAICAQIBMA8GDSqGSIb3TAUEAgIBAgIw +DwYNKoZIhvdMBQQCAgECAzBGBggrBgEFBQcBAQQ6MDgwNgYIKwYBBQUHMAKGKmh0 +dHA6Ly9yZXBvc2l0b3J5LmVtc2lnbi5jb20vY2VydHMvNFI1LmNydDA2BgNVHR8E +LzAtMCugKaAnhiVodHRwOi8vcmV1bmEtY2EucmV1bmEuY2wvY3JsL3Jvb3QuY3Js +MA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEAMA0GCSqGSIb3DQEB +DAUAA4ICAQAvGKUZ9oAcQa9656d5LwqYictpEwIAvf3NDDXhHrINVDryfq5I3nky +0Sk5VcH681FEYh4CVfnykVrIoSPHtfovl8U53T4T/vgJg0+GzUUR8W6bT0rj5j/R +/wh/86Mu8XkHKkt8xiJLShm5w/jrtW71xuX6fVN9b3xGUfJIompEykX2M5Qb217r +d50D96relTC6gv08wcq8v6RprFnxeLkJrdBAus8Ir0VOQeg7ILZCYH6khCk1qdNo +48sIjH/x0nCePeV9EqlvigHVyQXM9jt5bCFyZMRoB6JlZgH33c5AZi3+wqGp/VfJ +JUQpwwjzMUwi9rLe8Y6g/oaDj27e5XO94GScjZXm5dNkMT/oaYkTKoI4qsRZ48pW +qRf9/pmkbVOVVuxMmtbw4/VA3b9Nv429SLQFqNP9fihLmY6CFxImbbpdsnyg/dQH +8t6qqbahkxzgBU/F+oKW6Zs1+At96P2szZfX9q0AgZoPFy69u54ZJTTdknbmu3Pn +Okrnifj/x06boq4IIluqwN1nGazHdZsj5GHO4YtpqrZByyJz2EHcIccXU4B2TeyW +vy6a8+/2Mb+IhMo7ob1CLIZMzhETpbThPDlZOtHak41k8ttS9eFUY9iqUoCtXXQe +0kG7CICR0jW+riPcQZreJB4wxD+tn1NGd4IbrBcrdp57BSqFiUYFvg== +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.signing_policy igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.signing_policy --- igtf-policy-bundle-1.133/src/accredited/REUNA-ICA-C5.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/REUNA-ICA-C5.signing_policy 2026-03-25 13:54:43.000000000 +0000 @@ -0,0 +1,5 @@ +# @(#)REUNA-ICA-C5.signing_policy +# +access_id_CA X509 '/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5' +pos_rights globus CA:sign +cond_subjects globus '"/C=CL/O=REUNACA/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/REUNA-ca.info igtf-policy-bundle-1.140/src/accredited/REUNA-ca.info --- igtf-policy-bundle-1.133/src/accredited/REUNA-ca.info 2025-02-11 20:08:14.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/REUNA-ca.info 2026-03-25 13:54:43.000000000 +0000 @@ -8,5 +8,5 @@ email = reuna-ca@reuna.cl status = accredited:classic sha1fp.0 = 94:CE:21:D2:CB:3E:DF:2A:02:C1:EC:00:3B:2D:C0:18:A0:53:DE:85 -version = 1.133 +version = 1.140 subjectdn = "/C=CL/O=REUNACA/CN=REUNA Certification Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/ResearchandEducationTrustECCRootCA.info igtf-policy-bundle-1.140/src/accredited/ResearchandEducationTrustECCRootCA.info --- igtf-policy-bundle-1.133/src/accredited/ResearchandEducationTrustECCRootCA.info 2025-02-11 20:08:14.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ResearchandEducationTrustECCRootCA.info 2026-03-25 13:54:43.000000000 +0000 @@ -8,6 +8,6 @@ url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 2E:60:72:13:C0:06:73:23:38:CA:83:D6:87:56:09:3F:F2:1E:E2:96 subjectdn = "/O=Research and Education Trust/CN=Research and Education Trust ECC Root CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/ResearchandEducationTrustRSARootCA.info igtf-policy-bundle-1.140/src/accredited/ResearchandEducationTrustRSARootCA.info --- igtf-policy-bundle-1.133/src/accredited/ResearchandEducationTrustRSARootCA.info 2025-02-11 20:08:14.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/ResearchandEducationTrustRSARootCA.info 2026-03-25 13:54:43.000000000 +0000 @@ -8,6 +8,6 @@ url = https://security.geant.org/trusted-certificate-services/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 82:B6:21:AA:3E:55:62:54:38:3C:17:EB:43:0A:10:1F:B5:4A:37:F6 subjectdn = "/O=Research and Education Trust/CN=Research and Education Trust RSA Root CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/RomanianGRID.info igtf-policy-bundle-1.140/src/accredited/RomanianGRID.info --- igtf-policy-bundle-1.133/src/accredited/RomanianGRID.info 2025-02-11 20:08:15.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/RomanianGRID.info 2026-03-25 13:54:44.000000000 +0000 @@ -7,6 +7,6 @@ policy_url = http://www.romaniangrid.ro/docs/RomanianGRID_CA_v1.4.pdf email = grid-ca@rosa.ro status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 18:1F:F6:66:28:41:94:6E:57:C3:D3:4D:F8:B3:B6:31:4E:FB:26:09 subjectdn = "/DC=RO/DC=RomanianGRID/O=ROSA/OU=Certification Authority/CN=RomanianGRID CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/SRCE.info igtf-policy-bundle-1.140/src/accredited/SRCE.info --- igtf-policy-bundle-1.133/src/accredited/SRCE.info 2025-02-11 20:08:15.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/SRCE.info 2026-03-25 13:54:44.000000000 +0000 @@ -4,6 +4,6 @@ crl_url = http://ra.srce.hr/cacrl.crl email = srce-ca@srce.hr status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 68:20:69:5A:4E:95:F4:48:BB:8F:BE:DE:67:77:84:C0:0D:E5:46:C0 subjectdn = "/C=HR/O=edu/OU=srce/CN=SRCE CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/SiGNET-CA.info igtf-policy-bundle-1.140/src/accredited/SiGNET-CA.info --- igtf-policy-bundle-1.133/src/accredited/SiGNET-CA.info 2025-02-11 20:08:16.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/SiGNET-CA.info 2026-03-25 13:54:44.000000000 +0000 @@ -9,6 +9,6 @@ email = signet-ca@ijs.si status = accredited:classic url = http://signet-ca.ijs.si/ -version = 1.133 +version = 1.140 sha1fp.0 = 15:01:9E:62:9D:F2:5C:C6:5F:A7:13:7E:E3:85:3A:DD:20:BC:54:44 subjectdn = "/C=SI/O=SiGNET/CN=SiGNET CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/SlovakGrid.info igtf-policy-bundle-1.140/src/accredited/SlovakGrid.info --- igtf-policy-bundle-1.133/src/accredited/SlovakGrid.info 2025-02-11 20:08:16.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/SlovakGrid.info 2026-03-25 13:54:44.000000000 +0000 @@ -7,6 +7,6 @@ email = ca.ui@sav.sk crl_url = http://ups.savba.sk/ca/slovakgrid.crl status = accredited:classic -version = 1.133 -sha1fp.0 = 24:C9:E7:2C:BE:65:9A:90:0F:A5:40:46:02:6D:E2:0D:B4:B8:F3:5A +version = 1.140 +sha1fp.0 = 4A:48:FD:4A:C9:42:AA:CF:F7:61:44:69:1C:13:D7:E5:04:40:97:55 subjectdn = "/C=SK/O=SlovakGrid/CN=SlovakGrid CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/SlovakGrid.pem igtf-policy-bundle-1.140/src/accredited/SlovakGrid.pem --- igtf-policy-bundle-1.133/src/accredited/SlovakGrid.pem 2025-02-11 20:08:16.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/SlovakGrid.pem 2026-03-25 13:54:44.000000000 +0000 @@ -1,7 +1,7 @@ -----BEGIN CERTIFICATE----- -MIIDqDCCApCgAwIBAgICBy4wDQYJKoZIhvcNAQELBQAwOjELMAkGA1UEBhMCU0sx +MIIDqDCCApCgAwIBAgICB9gwDQYJKoZIhvcNAQELBQAwOjELMAkGA1UEBhMCU0sx EzARBgNVBAoTClNsb3Zha0dyaWQxFjAUBgNVBAMTDVNsb3Zha0dyaWQgQ0EwHhcN -MDIxMjE3MTExODM1WhcNMjYxMjEyMTExODM1WjA6MQswCQYDVQQGEwJTSzETMBEG +MDIxMjE3MTExODM1WhcNMzIxMjEyMTExODM1WjA6MQswCQYDVQQGEwJTSzETMBEG A1UEChMKU2xvdmFrR3JpZDEWMBQGA1UEAxMNU2xvdmFrR3JpZCBDQTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMcUYEVpY5o+aeLiKYTkZ8FyPaq0N52o /bFvB7eI8cQf0+B/S5sR6SJHTZ5a3tJgrGHsGdtkRyyWRgmfRgJbJ/eeqtZ/tRdv @@ -13,10 +13,10 @@ u4dK+SkRnX+PuaMYxZJhbEbujecwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E BAMCAcYwGQYDVR0SBBIwEIEOY2EudWlAc2F2YmEuc2swNgYDVR0fBC8wLTAroCmg J4YlaHR0cDovL3Vwcy5zYXZiYS5zay9jYS9zbG92YWtncmlkLmNybDANBgkqhkiG -9w0BAQsFAAOCAQEAmGbBHDQLgSO+zuPlsruK2xjMAQaA3SAc/K1sJhFg8niezoi8 -fmhmq9Ipcgx4MmkKrTm5yD/PYn+DxI4Wcu8A+JapPrKfFtJ/BfHaCsOBOPl5cbOk -UwueuprBpdVPRbg7GqwxnYCeFm90dVMzenM4J+UDR5/K27aNwlhl4XPLdzGyIJUF -1LOK5DlA4HHZig078XCpv79IH21dJsWRNFUjI8yK4Pp3kDTMIGbvpOTk5wdaJJ4G -MccNOx2Sbfs+Wo0+1RSyZ2PXozVAbX2OLgR2kNt+xORnqc3KWN+KrQEHREBAOvmJ -gw+vEHwc/mWBiL3IMVSWWeHQxRccbOu1LcYTlg== +9w0BAQsFAAOCAQEANN0TCtakl7tnZBwX83s8BhkTVLs9p3A6Q9i7uOS+6DOc1ntq +eSo76YbgiM7nYTXEnkHMME78OtUfBtvn1kiu/aZa6r3I5EqzDeOXDVeu5nKsX3tb +gNT/c6X6mRtoVs6SJBUwWCAaEnvAHYEIvuUUpLdjlT0CbXEVNoD8jtm/SDCCAHHu +T5CE1dvRIfmHrSBC3ON2X1PmX+3YYAW4WUVjJ5v2BHnApF++cQE8qboT7c//bLvI +FHRACiJ110weXWJOuHp73WFNpb1sX7IzTlqvquFvQicixF5ktRfPGeRzQApBS79G +3PcprhntriQcmWFES4O6UPl+8bh8EL5Q1qodOg== -----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/TRGrid.crl_url igtf-policy-bundle-1.140/src/accredited/TRGrid.crl_url --- igtf-policy-bundle-1.133/src/accredited/TRGrid.crl_url 2025-02-11 20:08:17.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/TRGrid.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1 +0,0 @@ -http://www.grid.org.tr/ca/crl/crl.der diff -Nru igtf-policy-bundle-1.133/src/accredited/TRGrid.info igtf-policy-bundle-1.140/src/accredited/TRGrid.info --- igtf-policy-bundle-1.133/src/accredited/TRGrid.info 2025-02-11 20:08:17.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/TRGrid.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,13 +0,0 @@ -# TRGrid CA Information -# -# @(#)$Id: 1691b9ba.info,v 1.3 2009/09/23 12:41:55 pmacvsdg Exp $ -# -alias = TRGrid -ca_url = http://www.grid.org.tr/ca/ca_cert/1691b9ba.0 -crl_url = http://www.grid.org.tr/ca/crl/crl.der -email = ca@grid.org.tr -status = accredited:classic -url = http://www.grid.org.tr/ca -version = 1.133 -sha1fp.0 = A2:31:9E:C8:90:AF:D9:6D:F4:4A:59:31:F2:E6:D2:D5:39:EC:1D:F0 -subjectdn = "/C=TR/O=TRGrid/CN=TR-Grid CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/TRGrid.namespaces igtf-policy-bundle-1.140/src/accredited/TRGrid.namespaces --- igtf-policy-bundle-1.133/src/accredited/TRGrid.namespaces 2025-02-11 20:08:17.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/TRGrid.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,13 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)1691b9ba.namespaces -# CA alias : TRGrid -# subord_of: -# subjectDN: /C=TR/O=TRGrid/CN=TR-Grid CA -# hash : 1691b9ba -# (generated automatically from ./EUGridPMA/TRGrid/1691b9ba.signing_policy) -# -TO Issuer "/C=TR/O=TRGrid/CN=TR-Grid CA" \ - PERMIT Subject "/C=TR/O=TRGrid/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/TRGrid.pem igtf-policy-bundle-1.140/src/accredited/TRGrid.pem --- igtf-policy-bundle-1.133/src/accredited/TRGrid.pem 2025-02-11 20:08:17.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/TRGrid.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,23 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDyjCCArKgAwIBAgIJAKnph0aQlpRvMA0GCSqGSIb3DQEBBQUAMDMxCzAJBgNV -BAYTAlRSMQ8wDQYDVQQKEwZUUkdyaWQxEzARBgNVBAMTClRSLUdyaWQgQ0EwHhcN -MDUxMDA3MTM0MzMyWhcNMjUxMDA2MTM0MzMyWjAzMQswCQYDVQQGEwJUUjEPMA0G -A1UEChMGVFJHcmlkMRMwEQYDVQQDEwpUUi1HcmlkIENBMIIBIjANBgkqhkiG9w0B -AQEFAAOCAQ8AMIIBCgKCAQEAvY9W0tRZ38QiIODvQmQ0iR0C6L4sBfOVAhjB2Cxl -uPUfBJ41+eOoHYZQFNcXfmoOqGD0nocsSVRSP+LHwfSb4Zw8LQCIuwl5N/jZ6CbS -UDEdxhcDmb+7jgccInoqx4xRWYOpy4OFD91MrW/vl3xKtxxnu/27MkPLQr6oWOE7 -O+jY+G+D5zlotN0N92A48qrVXZfMjauvygmz4CQAdMpvO2thHjTJhZmstbdvAdCy -6Xf6i/r3x6VTN1ucC3rrkNEqDFgBq/D6qPDta5XuIZPcmyProXjxF2kCXdwVi9gf -Fx1puBw8xXwHsEn/mg9T+6Var6gVFbj+AHNw+W81uZGuxQIDAQABo4HgMIHdMA8G -A1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQmEQQXACL3 -ECnqOiWaPbQ9wi7WVzBjBgNVHSMEXDBagBQmEQQXACL3ECnqOiWaPbQ9wi7WV6E3 -pDUwMzELMAkGA1UEBhMCVFIxDzANBgNVBAoTBlRSR3JpZDETMBEGA1UEAxMKVFIt -R3JpZCBDQYIJAKnph0aQlpRvMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly93d3cu -Z3JpZC5vcmcudHIvY2EvY3JsL2NybC5kZXIwDQYJKoZIhvcNAQEFBQADggEBAA8S -nIAY2S232ys+sdz92UlkBVBGPTYVLevTY+r42OiIj8M/BSs03SrBncZQrUCm4rP9 -igtC3Mhqh0X9bNFNN+o4PglxWPNcxxIFFf0d9LS2iSEPJemlkZHnO6SkTPshd+qA -T33u+8HtZllX32YZXyVH2WDf2Kcu4CUAxBcav5C5f7FRY02JwDtOujV6wHU+JYcw -VCFVtVuI3OYxALwgE3tZ8B498IWAXOLVgAjIyWCGkQt/UR0XzNZwIVRXW2GFiZlJ -U+Tc5lfK5RMxENs5plt9jBEalT3mNcCgoydr+/DrCrpZG/vmhITy/cdW9IT8TApo -MFrjzedS1lMftr3HGlQ= ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/TRGrid.signing_policy igtf-policy-bundle-1.140/src/accredited/TRGrid.signing_policy --- igtf-policy-bundle-1.133/src/accredited/TRGrid.signing_policy 2025-02-11 20:08:17.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/TRGrid.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,5 +0,0 @@ -# @(#)$Id$ -# -access_id_CA X509 '/C=TR/O=TRGrid/CN=TR-Grid CA' -pos_rights globus CA:sign -cond_subjects globus '"/C=TR/O=TRGrid/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/TRGrid2024.info igtf-policy-bundle-1.140/src/accredited/TRGrid2024.info --- igtf-policy-bundle-1.133/src/accredited/TRGrid2024.info 2025-02-11 20:08:17.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/TRGrid2024.info 2026-03-25 13:54:44.000000000 +0000 @@ -8,6 +8,6 @@ email = ca@truba.gov.tr status = accredited:classic url = http://www.truba.gov.tr/index.php/en/certification-authority/ -version = 1.133 +version = 1.140 sha1fp.0 = A9:A8:50:91:98:4A:AE:F3:71:BE:AF:95:20:39:C3:5C:07:B9:28:7E subjectdn = "/C=TR/O=TRGrid/CN=TR-Grid CA 2024" diff -Nru igtf-policy-bundle-1.133/src/accredited/UGRID-G2.info igtf-policy-bundle-1.140/src/accredited/UGRID-G2.info --- igtf-policy-bundle-1.133/src/accredited/UGRID-G2.info 2025-02-11 20:08:18.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/UGRID-G2.info 2026-03-25 13:54:44.000000000 +0000 @@ -8,6 +8,6 @@ email = ca@ugrid.org status = accredited:classic url = https://ca.ugrid.org/ -version = 1.133 +version = 1.140 sha1fp.0 = 58:86:89:27:79:7F:00:55:A4:C3:26:0E:EB:F1:ED:3D:0C:6A:B6:3A subjectdn = "/DC=org/DC=ugrid/CN=UGRID CA G2" diff -Nru igtf-policy-bundle-1.133/src/accredited/UKeScienceCA-2B.info igtf-policy-bundle-1.140/src/accredited/UKeScienceCA-2B.info --- igtf-policy-bundle-1.133/src/accredited/UKeScienceCA-2B.info 2025-02-11 20:08:19.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/UKeScienceCA-2B.info 2026-03-25 13:54:45.000000000 +0000 @@ -8,6 +8,6 @@ crl_url = http://crl.ca.ngs.ac.uk/crl/escience2b.crl email = support@grid-support.ac.uk status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = F3:03:90:25:E1:FD:F5:9D:B9:4A:97:F2:73:97:DE:73:91:B7:E9:AB subjectdn = "/C=UK/O=eScienceCA/OU=Authority/CN=UK e-Science CA 2B" diff -Nru igtf-policy-bundle-1.133/src/accredited/UKeScienceRoot-2007.info igtf-policy-bundle-1.140/src/accredited/UKeScienceRoot-2007.info --- igtf-policy-bundle-1.133/src/accredited/UKeScienceRoot-2007.info 2025-02-11 20:08:19.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/UKeScienceRoot-2007.info 2026-03-25 13:54:45.000000000 +0000 @@ -7,6 +7,6 @@ crl_url = http://crl.ca.ngs.ac.uk/crl/root-crl.der email = support@grid-support.ac.uk status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 59:7C:1A:AA:EC:65:7E:4A:F5:6A:00:1F:E2:16:44:48:96:35:DB:B1 subjectdn = "/C=UK/O=eScienceRoot/OU=Authority/CN=UK e-Science Root" diff -Nru igtf-policy-bundle-1.133/src/accredited/UNAMgrid-ca.info igtf-policy-bundle-1.140/src/accredited/UNAMgrid-ca.info --- igtf-policy-bundle-1.133/src/accredited/UNAMgrid-ca.info 2025-02-11 20:08:20.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/UNAMgrid-ca.info 2026-03-25 13:54:45.000000000 +0000 @@ -9,5 +9,5 @@ email = camanager@unam.mx status = accredited:classic sha1fp.0 = 98:93:D3:0C:24:94:61:F4:59:74:1C:DD:A9:1F:AC:A5:7A:21:43:B7 -version = 1.133 +version = 1.140 subjectdn = "/C=MX/O=UNAMgrid/OU=UNAM/CN=CA" diff -Nru igtf-policy-bundle-1.133/src/accredited/USERTrustECCCertificationAuthority.info igtf-policy-bundle-1.140/src/accredited/USERTrustECCCertificationAuthority.info --- igtf-policy-bundle-1.133/src/accredited/USERTrustECCCertificationAuthority.info 2025-02-11 20:08:20.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/USERTrustECCCertificationAuthority.info 2026-03-25 13:54:45.000000000 +0000 @@ -9,6 +9,6 @@ url = https://sectigo.com/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = D1:CB:CA:5D:B2:D5:2A:7F:69:3B:67:4D:E5:F0:5A:1D:0C:95:7D:F0 subjectdn = "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/USERTrustRSACertificationAuthority.info igtf-policy-bundle-1.140/src/accredited/USERTrustRSACertificationAuthority.info --- igtf-policy-bundle-1.133/src/accredited/USERTrustRSACertificationAuthority.info 2025-02-11 20:08:21.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/USERTrustRSACertificationAuthority.info 2026-03-25 13:54:46.000000000 +0000 @@ -9,6 +9,6 @@ url = https://sectigo.com/ email = tcs-pma@lists.geant.org status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 2B:8F:1B:57:33:0D:BB:A2:D0:7A:6C:51:F7:0E:E9:0D:DA:B9:AD:8E subjectdn = "/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority" diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-basic.crl_url igtf-policy-bundle-1.140/src/accredited/cilogon-basic.crl_url --- igtf-policy-bundle-1.133/src/accredited/cilogon-basic.crl_url 2025-02-11 20:08:21.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-basic.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1,2 +0,0 @@ -http://crl-cilogon.ncsa-security.net/cilogon-basic.crl -http://crl.cilogon.org/cilogon-basic.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-basic.info igtf-policy-bundle-1.140/src/accredited/cilogon-basic.info --- igtf-policy-bundle-1.133/src/accredited/cilogon-basic.info 2025-02-11 20:08:21.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-basic.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,9 +0,0 @@ -alias = cilogon-basic -url = http://ca.cilogon.org/ -ca_url = https://cilogon.org/cilogon-basic.pem -crl_url = http://crl-cilogon.ncsa-security.net/cilogon-basic.crl;http://crl.cilogon.org/cilogon-basic.crl -email = ca@cilogon.org -status = accredited:iota -version = 1.133 -sha1fp.0 = 96:D8:FB:A6:F8:03:DA:A8:E7:70:DB:BA:5C:6A:2F:58:93:D8:60:28 -subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-basic.namespaces igtf-policy-bundle-1.140/src/accredited/cilogon-basic.namespaces --- igtf-policy-bundle-1.133/src/accredited/cilogon-basic.namespaces 2025-02-11 20:08:21.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-basic.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,12 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)28776852.namespaces -# CA alias : cilogon-basic -# subord_of: -# subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1 -# hash : 28776852 -# -TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1" \ - PERMIT Subject "/DC=org/DC=cilogon/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-basic.pem igtf-policy-bundle-1.140/src/accredited/cilogon-basic.pem --- igtf-policy-bundle-1.133/src/accredited/cilogon-basic.pem 2025-02-11 20:08:21.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-basic.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,23 +0,0 @@ ------BEGIN CERTIFICATE----- -MIID1TCCAr2gAwIBAgIJALlUNEZsE7Q5MA0GCSqGSIb3DQEBCwUAMGoxEzARBgoJ -kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG -EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEbMBkGA1UEAxMSQ0lMb2dvbiBCYXNpYyBD -QSAxMB4XDTEwMDYwNDIwMTkwOFoXDTMwMDYwNDIwMTkwOFowajETMBEGCgmSJomT -8ixkARkWA29yZzEXMBUGCgmSJomT8ixkARkWB2NpbG9nb24xCzAJBgNVBAYTAlVT -MRAwDgYDVQQKEwdDSUxvZ29uMRswGQYDVQQDExJDSUxvZ29uIEJhc2ljIENBIDEw -ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/ESK+Ve88+tU5atBtCBSp -tJR9MIPXz36/M2vbKupkizGLHlGO8p1tMNrUR8jQM5bPokp7JUqYfzx3BHldFj7T -Y78wUlgCqBT6KJCf1skWlSaF/7Lx5bnNT/pF6VkyEMvepp5FyttaYrXHmBpaPhnk -JZ9OjRf8Q79Acy0cnro5V2Oz7LgJ/W78zRhXOuSUQlDuZ/L7VvF7q4PnmFS+ZwSm -jJWvCUTY9D3U+ef2RluGrcYEYf14dd5UIeCmMaApqi5dhopXQXbQ0OWp9QRdjB5z -nA+7ZK0leMKMmId5kfWPcDf1iWHYII9IQoPEsiqDVLuAA/7yy2j5A+Unk0TtCYoB -AgMBAAGjfjB8MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1Ud -DgQWBBSaMcA1v2rOmCeEryQ9yZy3SNLWOzAfBgNVHSMEGDAWgBSaMcA1v2rOmCeE -ryQ9yZy3SNLWOzAZBgNVHREEEjAQgQ5jYUBjaWxvZ29uLm9yZzANBgkqhkiG9w0B -AQsFAAOCAQEAmPQtJ0o6r664pmFxLv1nKNL/uS9J+37OaD9ZQnX5KRNuJvlumwsg -ldjAwDgupC5kop6O0Aj/C1N6yz161DPy9x/Dr/FFoACuysSc/DlgAT5KFyOTHTWM -jo3TDdDDComCxkWvNTNNCGOR4MXN291DXn7MJwVTbuqtRu6cwY6pg+US1+gn9OEy -Ru+KiDF/LECIW8wSboCB4rOJAU9oNIYScMx0Yv5x7/D3/OprznRAdOowxLV5eZGj -WnTqOOFI51hueHVeP7mvqfhFZj+jqIF8bmEcWruj6UBaaBMBiMt1tPnF28Pivlsd -QKRPqSYmz22wTRfUg7bF3U+ILxLJd+fQkA== ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-basic.signing_policy igtf-policy-bundle-1.140/src/accredited/cilogon-basic.signing_policy --- igtf-policy-bundle-1.133/src/accredited/cilogon-basic.signing_policy 2025-02-11 20:08:21.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-basic.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,3 +0,0 @@ -access_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Basic CA 1' -pos_rights globus CA:sign -cond_subjects globus '"/DC=org/DC=cilogon/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-silver.crl_url igtf-policy-bundle-1.140/src/accredited/cilogon-silver.crl_url --- igtf-policy-bundle-1.133/src/accredited/cilogon-silver.crl_url 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-silver.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1,2 +0,0 @@ -http://crl-cilogon.ncsa-security.net/cilogon-silver.crl -http://crl.cilogon.org/cilogon-silver.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-silver.info igtf-policy-bundle-1.140/src/accredited/cilogon-silver.info --- igtf-policy-bundle-1.133/src/accredited/cilogon-silver.info 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-silver.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,9 +0,0 @@ -alias = cilogon-silver -url = http://ca.cilogon.org/ -ca_url = https://cilogon.org/cilogon-silver.pem -crl_url = http://crl-cilogon.ncsa-security.net/cilogon-silver.crl;http://crl.cilogon.org/cilogon-silver.crl -email = ca@cilogon.org -status = accredited:mics -version = 1.133 -sha1fp.0 = 4A:54:1C:24:BE:2F:8C:B1:F3:21:E9:3E:2D:7D:A8:87:5F:AB:13:D6 -subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1" diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-silver.namespaces igtf-policy-bundle-1.140/src/accredited/cilogon-silver.namespaces --- igtf-policy-bundle-1.133/src/accredited/cilogon-silver.namespaces 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-silver.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,12 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)10718cba.namespaces -# CA alias : cilogon-silver -# subord_of: -# subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1 -# hash : 10718cba -# -TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1" \ - PERMIT Subject "/DC=org/DC=cilogon/.*" - diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-silver.pem igtf-policy-bundle-1.140/src/accredited/cilogon-silver.pem --- igtf-policy-bundle-1.133/src/accredited/cilogon-silver.pem 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-silver.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,23 +0,0 @@ ------BEGIN CERTIFICATE----- -MIID1zCCAr+gAwIBAgIJAPzABNJ2U9LQMA0GCSqGSIb3DQEBCwUAMGsxEzARBgoJ -kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG -EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBTaWx2ZXIg -Q0EgMTAeFw0xMDA2MDQyMDIwMTRaFw0zMDA2MDQyMDIwMTRaMGsxEzARBgoJkiaJ -k/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQGEwJV -UzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBTaWx2ZXIgQ0Eg -MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANpIdBE+VFt91/2o3vtG -mFq0DbwBeon0/0E2dmMUpb/D/lm3y4Nnhnq1Vegey6UAdh0FfzrxKaeSkhS93Avm -mgbEdD7yE1RuStn9NbIIWSIO34Fi8UAxJ4CS852UIMRptoYk9IW+qincpEgwOQRH -FzWeUz3GyTXuPY74aQb3YC0RrceVIqcPdEEyczi4hlOlNKzfOF4uidoqprUc7Pc9 -kMakldvdH1NXZDFDd7tMGr4FD2Kl0PLnFq2v4OCdH9Db03IfehRSQPA7gnZDjyLX -EphMaGtXzMfjfA77ull/DyrZ/z212x4y9A6Fy/rmgjhoET5wQVfhJ4PdITXooECo -ZKsCAwEAAaN+MHwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD -VR0OBBYEFEENPrWb8wHaeL2DHsLFVulpdjpYMB8GA1UdIwQYMBaAFEENPrWb8wHa -eL2DHsLFVulpdjpYMBkGA1UdEQQSMBCBDmNhQGNpbG9nb24ub3JnMA0GCSqGSIb3 -DQEBCwUAA4IBAQDLfUB1sv85RK5JRL6Lku9+9v2Jlgcd+uJOODjF/BzLm4gXt6Cq -gLdFkeURJvwXyIRSQ7ok11pjjz0VA/wFkvO/89A0PxB9tuQQy2276cIxeeyWQkQT -doucVgrE7+ZGF/9R1ssXUCNpWkZZeC8a0HgZLnXstzQmsbxNsE1bP+hW3Ji9QAPP -JtkYjjUDAGJa7UCeJ3izPON1gsU2uLoqdWvzqAa1xrZqAjktZR0dXYNm88b5mAL5 -w1gVY7JKlyJjCIK9rCAqEcncvyaz5huqcJ3O6DENku4jzOppEKaNSffAJg9Fo4wh -jAe7J7wB4AeNpDqaOdxsoQX8c6eHHyJ+b+P7 ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/cilogon-silver.signing_policy igtf-policy-bundle-1.140/src/accredited/cilogon-silver.signing_policy --- igtf-policy-bundle-1.133/src/accredited/cilogon-silver.signing_policy 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/cilogon-silver.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,3 +0,0 @@ -access_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon Silver CA 1' -pos_rights globus CA:sign -cond_subjects globus '"/DC=org/DC=cilogon/*"' diff -Nru igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC4.info igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC4.info --- igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC4.info 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC4.info 2026-03-25 13:54:46.000000000 +0000 @@ -9,6 +9,6 @@ url = https://emudhra.com/products/digital-certificates email = support@emsign.com status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 3B:6F:67:1F:CD:FC:17:01:64:1C:8D:07:15:18:37:79:01:54:6A:66 subjectdn = "/C=US/OU=emSign PKI/O=eMudhra Inc/CN=emSign Trusted Root CA - C4" diff -Nru igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC5.info igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC5.info --- igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC5.info 2025-02-11 20:08:23.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC5.info 2026-03-25 13:54:46.000000000 +0000 @@ -9,6 +9,6 @@ url = https://emudhra.com/products/digital-certificates email = support@emsign.com status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 72:F2:9E:E7:F8:EE:B6:DE:9D:EF:CC:02:47:2A:1C:D1:16:1D:AF:1A subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" diff -Nru igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC5.namespaces igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC5.namespaces --- igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC5.namespaces 2025-02-11 20:08:23.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC5.namespaces 2026-03-25 13:54:46.000000000 +0000 @@ -3,10 +3,7 @@ # # @(#)TrustedRootCAC5.signing_policy.namespaces # CA alias : TrustedRootCAC5 -# subord_of: # subjectDN: /C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5 -# hash : TrustedRootCAC5.signing_policy -# (generated automatically from TrustedRootCAC5.signing_policy) # TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" \ PERMIT Subject "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" @@ -14,3 +11,6 @@ TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" \ PERMIT Subject "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" +TO Issuer "/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" \ + PERMIT Subject "/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5" + diff -Nru igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC5.signing_policy igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC5.signing_policy --- igtf-policy-bundle-1.133/src/accredited/eMudhra-TrustedRootCAC5.signing_policy 2025-02-11 20:08:23.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/eMudhra-TrustedRootCAC5.signing_policy 2026-03-25 13:54:46.000000000 +0000 @@ -1,4 +1,4 @@ # EACL for eMudhra emSign CA TrustedRootCAC5 access_id_CA X509 '/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5' pos_rights globus CA:sign - cond_subjects globus '"/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1"' + cond_subjects globus '"/C=US/O=eMudhra Inc./CN=emSign Trusted Root CA - C5" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" "/C=CL/O=REUNA CA/CN=REUNA Issuing CA - C5"' diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignClass1CAG1.info igtf-policy-bundle-1.140/src/accredited/emSignClass1CAG1.info --- igtf-policy-bundle-1.133/src/accredited/emSignClass1CAG1.info 2025-02-11 20:08:24.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignClass1CAG1.info 2026-03-25 13:54:46.000000000 +0000 @@ -10,6 +10,6 @@ email = support@emsign.com requires = emSignRootCAG1 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 35:C3:88:FE:BC:BF:72:EE:67:B9:5B:5E:E4:D4:5E:AD:1A:41:9D:B4 subjectdn = "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Class 1 CA - G1" diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignRootCAG1.info igtf-policy-bundle-1.140/src/accredited/emSignRootCAG1.info --- igtf-policy-bundle-1.133/src/accredited/emSignRootCAG1.info 2025-02-11 20:08:24.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignRootCAG1.info 2026-03-25 13:54:46.000000000 +0000 @@ -9,6 +9,6 @@ url = https://emudhra.com/products/digital-certificates email = support@emsign.com status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 8A:C7:AD:8F:73:AC:4E:C1:B5:75:4D:A5:40:F4:FC:CF:7C:B5:8E:8C subjectdn = "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign Root CA - G1" diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.crl_url igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.crl_url --- igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.crl_url 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.crl_url 2026-03-25 13:54:47.000000000 +0000 @@ -0,0 +1 @@ +http://crl.emsign.com/?roottlscag1.crl diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.info igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.info --- igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.info 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.info 2026-03-25 13:54:47.000000000 +0000 @@ -0,0 +1,16 @@ +# +# @(#)emSignRootTLSCAG1.info +# eMuhdra emSign Certifying Authority trust anchor emSignRootTLSCAG1 +# TLS server specific joint trust hierarchy root +# C=IN, O=eMudhra Technologies Limited, CN=emSign Root TLS CA - G1 +# +alias = emSignRootTLSCAG1 +ca_url = https://repository.emsign.com/certs/roottlscag1.crt +crl_url = http://crl.emsign.com/?roottlscag1.crl +policy_url = https://repository.emsign.com/ +url = https://emudhra.com/products/digital-certificates +email = support@emsign.com +status = accredited:classic +version = 1.140 +sha1fp.0 = A6:70:CB:DE:48:25:54:12:9C:AD:3E:1C:4B:13:72:F6:69:F7:5C:AD +subjectdn = "/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1" diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.namespaces igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.namespaces --- igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.namespaces 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.namespaces 2026-03-25 13:54:47.000000000 +0000 @@ -0,0 +1,46 @@ +############################################################################## +#NAMESPACES-VERSION: 1.0 +# +# @(#)emSignRootTLSCAG1.namespaces +# CA alias : emSignRootTLSCAG1 +# subjectDN: /C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1 +# +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1" \ + PERMIT Subject "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" + +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1" \ + PERMIT Subject "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" + +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1" \ + PERMIT Subject "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" + +# /C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1 +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" \ + PERMIT Subject "/C=US/O=emSignGrid/.*" + +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" \ + PERMIT Subject "/DC=com/DC=emSignGrid/.*" + +TO Issuer "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" \ + PERMIT Subject "/DC=org/DC=emSignGrid/.*" + +# /C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B +TO Issuer "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" \ + PERMIT Subject "/C=US/O=emSignGrid/.*" + +TO Issuer "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" \ + PERMIT Subject "/DC=com/DC=emSignGrid/.*" + +TO Issuer "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" \ + PERMIT Subject "/DC=org/DC=emSignGrid/.*" + +# /C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C +TO Issuer "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" \ + PERMIT Subject "/C=US/O=emSignGrid/.*" + +TO Issuer "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" \ + PERMIT Subject "/DC=com/DC=emSignGrid/.*" + +TO Issuer "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C" \ + PERMIT Subject "/DC=org/DC=emSignGrid/.*" + diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.pem igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.pem --- igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.pem 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.pem 2026-03-25 13:54:47.000000000 +0000 @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFeDCCA2CgAwIBAgIQAqJ9TjRq705PBGeLW7bZ7jANBgkqhkiG9w0BAQwFADBW +MQswCQYDVQQGEwJJTjElMCMGA1UECgwcZU11ZGhyYSBUZWNobm9sb2dpZXMgTGlt +aXRlZDEgMB4GA1UEAwwXZW1TaWduIFJvb3QgVExTIENBIC0gRzEwHhcNMjQwMjA4 +MDc0NTQxWhcNNDkwMjA3MDc0NTQxWjBWMQswCQYDVQQGEwJJTjElMCMGA1UECgwc +ZU11ZGhyYSBUZWNobm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAwwXZW1TaWduIFJv +b3QgVExTIENBIC0gRzEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDD +5uZptd+iJlMNRHX6T/rWNDpgoJx9XrujLzK+D/4rBHbEbZlYx+udyR5z6T3lIxkm +7yyhgmm7/WL1QUoWTr6yNxgyD604LslITjYsoK42EjHG5BtFqLqDxcmzRNSI2JXg +LkPJnc+YLGfepQn2gH5stQvaYnVAcHhfSlkN9R80G0mpOU/tMqgssTRmTXZ616HR +MLh/ZI/jDrd8C/OivCmB+gib97soX2tFEMPh6N7TR/w8HV7NZvRVFYopqlnfRmXL +HGAe7puPOIlQ1Y4pjXfXDGNWxDABaQsM8snFr643Y1e+KuPHgiE64ONRkkulq9Ds +SgWNzIdWLfrZd9DFkFXG9MmYLfHtDqtmtuS2WKU8+3jASffmZvgCShO+bxindJcG +uvI/ZvL29vpdcN7W5dTgGRhgOQ+xXAXBoiBQF5v2qrNJRGEmZqf1Mxq8LbMLTyp6 +oUfOxKJTvgDHbxiQJ24arL67F9hXMWlezn9ryFgyeoXaVmh2uWIzV6QoA6YmikXe +ReqKULG/FpkHVLMGYCKHC2+HoCs0f53WF+sZcZy/4VO1thy6l3JC0dRzQhc+sC4C +7h5ou2X98e+tAWz9B8ESFq8hlAyYQJofoINyTU/x0QS/W2KQSi+8ozPiCe9EOLUR +VsJaRjM4kTTTi3jpHptQwcQ5evkNwNL+Ufxy1TBtKQIDAQABo0IwQDAdBgNVHQ4E +FgQUZB3J2PjE7ARLIoH1MppeueeTUvkwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAD3Pk+14JsomTm+KDF8TqQ9IYpem +DU667BUmF7ErSnXRLlWDroIvA9CwB65t1pZp+oWANgFaB0tWTIlyguBo+vZS2l8Z +b2go0YlRVtQCl8+vaQCH3NHot+qFb2n0SWMYu3NWt+uhz7X0MvWHkphlqoHHNVL/ +wEZ/Dl0GOrS44lKZPAeMnc9OG9VR4bAo08ub88UZEFZgTTT0cjqxTUM1y/2oYhm3 +xCloiFLA8UEeGhytomOzgddNDuil3ljYkqxyEB8XewAWwGuNupYZSAXetscuFvTR +Bx5j6pcLRQwxj/kszZ+incYArj//yKAM28gxK+Jfd9uLtuIx/48e5lcBSdlwXWTB +NB3AfC0O9+Xrmv6x9bU9cJ1EeSaxJY6HKOUaw0mgNX60Pkb/jdjuYM6UAYTiKqAy +Tfc9GCH7Cy3RCCVTYS4IcbmkIBT34D/JMQZf1PYvQazuO7Hd7fzxnWWEB+LTVhM6 +a/Th/bxN0T6FO/jxkJSETZbaHXzrOLsLrcnhtuwjF9HTI59GuHvSf+ybXlrFQAIx +HbkQAXbPjfL0GsUzhlLOJoAnOhsbKsYoeQj9cK6Fe5O38t5E3nHR0KFZ0rGkr/jg +dhMbnq8xIYmTsAAZffcTxeapFF3csNubNdUVunOAEufRJ+ku4G9r7gPobCXcIP7g +VfxpDV3XJ4Ed5M7b +-----END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.signing_policy igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.signing_policy --- igtf-policy-bundle-1.133/src/accredited/emSignRootTLSCAG1.signing_policy 1970-01-01 00:00:00.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignRootTLSCAG1.signing_policy 2026-03-25 13:54:47.000000000 +0000 @@ -0,0 +1,5 @@ +# EACL for eMudhra emSign CA emSignRootTLSCAG1 +# /C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1 + access_id_CA X509 '/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1' + pos_rights globus CA:sign + cond_subjects globus '"/C=IN/O=eMudhra Technologies Limited/CN=emSign Root TLS CA - G1" "/C=IN/O=eMudhra Technologies Limited/CN=EM OV TLS CA - G2A-1" "/C=NL/O=eMudhra BV/CN=EM OV TLS CA - G2B" "/C=US/O=eMudhra Inc/CN=EM OV TLS CA - G2C"' diff -Nru igtf-policy-bundle-1.133/src/accredited/emSignSSLCAG1.info igtf-policy-bundle-1.140/src/accredited/emSignSSLCAG1.info --- igtf-policy-bundle-1.133/src/accredited/emSignSSLCAG1.info 2025-02-11 20:08:25.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emSignSSLCAG1.info 2026-03-25 13:54:47.000000000 +0000 @@ -10,6 +10,6 @@ email = support@emsign.com requires = emSignRootCAG1 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 47:64:AF:D6:A8:29:92:D9:31:47:25:B9:B8:77:05:AF:F4:E8:4B:E8 subjectdn = "/C=IN/OU=emSign PKI/O=eMudhra Technologies Limited/CN=emSign SSL CA - G1" diff -Nru igtf-policy-bundle-1.133/src/accredited/emigtfc4.info igtf-policy-bundle-1.140/src/accredited/emigtfc4.info --- igtf-policy-bundle-1.133/src/accredited/emigtfc4.info 2025-02-11 20:08:25.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emigtfc4.info 2026-03-25 13:54:47.000000000 +0000 @@ -10,6 +10,6 @@ email = support@emsign.com requires = eMudhra-TrustedRootCAC4 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 47:59:35:24:86:12:3C:6F:46:DC:69:09:BD:C6:A7:C2:46:B6:39:B1 subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C4" diff -Nru igtf-policy-bundle-1.133/src/accredited/emigtfc5.info igtf-policy-bundle-1.140/src/accredited/emigtfc5.info --- igtf-policy-bundle-1.133/src/accredited/emigtfc5.info 2025-02-11 20:08:26.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emigtfc5.info 2026-03-25 13:54:47.000000000 +0000 @@ -10,6 +10,6 @@ email = support@emsign.com requires = eMudhra-TrustedRootCAC5 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 5D:4F:21:2A:10:FC:A2:E1:27:50:F1:63:C3:6E:69:EF:C2:74:33:36 subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5" diff -Nru igtf-policy-bundle-1.133/src/accredited/emigtfc5r1.info igtf-policy-bundle-1.140/src/accredited/emigtfc5r1.info --- igtf-policy-bundle-1.133/src/accredited/emigtfc5r1.info 2025-02-11 20:08:26.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/emigtfc5r1.info 2026-03-25 13:54:47.000000000 +0000 @@ -10,6 +10,6 @@ email = support@emsign.com requires = eMudhra-TrustedRootCAC5 status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = 60:F6:D4:6D:D5:9B:8A:F9:6D:2D:BA:C2:EF:44:6A:FA:62:60:E0:B5 subjectdn = "/C=US/O=eMudhra Inc./CN=emSign Issuing CA IGTF - C5 - 1" diff -Nru igtf-policy-bundle-1.133/src/accredited/seegrid-ca-2013.info igtf-policy-bundle-1.140/src/accredited/seegrid-ca-2013.info --- igtf-policy-bundle-1.133/src/accredited/seegrid-ca-2013.info 2025-02-11 20:08:27.000000000 +0000 +++ igtf-policy-bundle-1.140/src/accredited/seegrid-ca-2013.info 2026-03-25 13:54:48.000000000 +0000 @@ -9,6 +9,6 @@ crl_url = http://crl.hellasgrid.gr/seegrid-ca-2013/crl-v2.pem email = see-grid-ca@hellasgrid.gr status = accredited:classic -version = 1.133 +version = 1.140 sha1fp.0 = DD:8C:D9:6E:18:AB:53:92:40:15:BF:DA:EB:F9:6F:31:EB:4F:69:66 subjectdn = "/DC=ORG/DC=SEE-GRID/CN=SEE-GRID CA 2013" diff -Nru igtf-policy-bundle-1.133/src/experimental/InCommon-RSA-IGTF-Server-CA-2.info igtf-policy-bundle-1.140/src/experimental/InCommon-RSA-IGTF-Server-CA-2.info --- igtf-policy-bundle-1.133/src/experimental/InCommon-RSA-IGTF-Server-CA-2.info 2025-02-11 20:08:08.000000000 +0000 +++ igtf-policy-bundle-1.140/src/experimental/InCommon-RSA-IGTF-Server-CA-2.info 2026-03-25 13:54:41.000000000 +0000 @@ -6,6 +6,6 @@ requires = USERTrustRSACertificationAuthority email = admin@incommon.org status = experimental -version = 1.133 +version = 1.140 sha1fp.0 = BC:74:A1:A0:E1:2D:6B:48:3A:FB:E0:B4:E7:DC:F1:60:04:22:C0:FA subjectdn = "/C=US/O=Internet2/CN=InCommon RSA IGTF Server CA 2" diff -Nru igtf-policy-bundle-1.133/src/experimental/cilogon-openid.crl_url igtf-policy-bundle-1.140/src/experimental/cilogon-openid.crl_url --- igtf-policy-bundle-1.133/src/experimental/cilogon-openid.crl_url 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/experimental/cilogon-openid.crl_url 1970-01-01 00:00:00.000000000 +0000 @@ -1,2 +0,0 @@ -http://crl-cilogon.ncsa-security.net/cilogon-openid.crl -http://crl.cilogon.org/cilogon-openid.crl diff -Nru igtf-policy-bundle-1.133/src/experimental/cilogon-openid.info igtf-policy-bundle-1.140/src/experimental/cilogon-openid.info --- igtf-policy-bundle-1.133/src/experimental/cilogon-openid.info 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/experimental/cilogon-openid.info 1970-01-01 00:00:00.000000000 +0000 @@ -1,9 +0,0 @@ -alias = cilogon-openid -url = http://ca.cilogon.org/ -ca_url = https://cilogon.org/cilogon-openid.pem -crl_url = http://crl-cilogon.ncsa-security.net/cilogon-openid.crl;http://crl.cilogon.org/cilogon-openid.crl -email = ca@cilogon.org -status = experimental -version = 1.133 -sha1fp.0 = 3F:31:DC:10:B9:AB:BB:C0:BD:68:63:F2:74:44:7D:FB:60:72:73:86 -subjectdn = "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" diff -Nru igtf-policy-bundle-1.133/src/experimental/cilogon-openid.namespaces igtf-policy-bundle-1.140/src/experimental/cilogon-openid.namespaces --- igtf-policy-bundle-1.133/src/experimental/cilogon-openid.namespaces 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/experimental/cilogon-openid.namespaces 1970-01-01 00:00:00.000000000 +0000 @@ -1,12 +0,0 @@ -############################################################################## -#NAMESPACES-VERSION: 1.0 -# -# @(#)3d863bc5.namespaces -# CA alias : cilogon-openid -# subord_of: -# subjectDN: /DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1 -# hash : 3d863bc5 -# -TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1" \ - PERMIT Subject "/DC=org/DC=cilogon/C=US/.*" - diff -Nru igtf-policy-bundle-1.133/src/experimental/cilogon-openid.pem igtf-policy-bundle-1.140/src/experimental/cilogon-openid.pem --- igtf-policy-bundle-1.133/src/experimental/cilogon-openid.pem 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/experimental/cilogon-openid.pem 1970-01-01 00:00:00.000000000 +0000 @@ -1,23 +0,0 @@ ------BEGIN CERTIFICATE----- -MIID1zCCAr+gAwIBAgIJAPOQiThGpSOaMA0GCSqGSIb3DQEBCwUAMGsxEzARBgoJ -kiaJk/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQG -EwJVUzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBPcGVuSUQg -Q0EgMTAeFw0xMDA2MDQyMDIwNDRaFw0zMDA2MDQyMDIwNDRaMGsxEzARBgoJkiaJ -k/IsZAEZFgNvcmcxFzAVBgoJkiaJk/IsZAEZFgdjaWxvZ29uMQswCQYDVQQGEwJV -UzEQMA4GA1UEChMHQ0lMb2dvbjEcMBoGA1UEAxMTQ0lMb2dvbiBPcGVuSUQgQ0Eg -MTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKaWHxXKkfgmJG31u0/I -b9uzHuwt9Ed+vdH4jtmgHj5nOgdJ14VF46B26u4wNJ7XhRjxb1xSXhhC3u3okfje -pas49RNVdEel4P2sWuQ9Rc6x+Tuo0/IFSTh5GDEizW7z9GYLcjMtadSPHngv0Pai -xFnjadxTg+Qr3vAoM52xPJEQjsGIcUb5ZBtYMpHWJTA9HCSsLM0i96/jzkMdxinx -lUD+qWWTdLppT/6neWfZC16cqRK5fhgx2drO/2oDcjQuBVszh92uRpLLvxTzF2Yg -mqsgd2ufkQB8BJ6ggs61KUm1myL2j+ZnLKdcUi/mYTV6/3gva35qF9mf2iUn12eV -chcCAwEAAaN+MHwwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD -VR0OBBYEFDXHbBFKB030gz1Uvu2/BDuuX8OsMB8GA1UdIwQYMBaAFDXHbBFKB030 -gz1Uvu2/BDuuX8OsMBkGA1UdEQQSMBCBDmNhQGNpbG9nb24ub3JnMA0GCSqGSIb3 -DQEBCwUAA4IBAQAmCfwcuxUMqxiB/OR1eiSrNNceDcV/RolpzdZlsMSl5A2S6RTq -uRv8u6TyltuikiMoLcvoq+msEh/lqBazdiJ3saR3A78VcOq04xv8Je1T9C9ArDOx -3fzQMxtDjU3egFqFhnLlFsHF68o8U8IMla4OjJti0Er7WtbSiXad5a7v4vx4s0R/ -LekmAg7TADxmIi8mBNo3xYvVj/QnVTNNfqZndbpCGjJcG3ncn08mr9dMNDgFXGZH -c4xJzYtqr6xwet2QUdGBuvZfZbet/JckJpE07F/voor3U4Q5O+8Kw/2nNLnL2nAF -vKVxWgw8sBb+32mycVB1tLIG3r4UsVkxQIvu ------END CERTIFICATE----- diff -Nru igtf-policy-bundle-1.133/src/experimental/cilogon-openid.signing_policy igtf-policy-bundle-1.140/src/experimental/cilogon-openid.signing_policy --- igtf-policy-bundle-1.133/src/experimental/cilogon-openid.signing_policy 2025-02-11 20:08:22.000000000 +0000 +++ igtf-policy-bundle-1.140/src/experimental/cilogon-openid.signing_policy 1970-01-01 00:00:00.000000000 +0000 @@ -1,3 +0,0 @@ -access_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OpenID CA 1' -pos_rights globus CA:sign -cond_subjects globus '"/DC=org/DC=cilogon/C=US/*"' diff -Nru igtf-policy-bundle-1.133/src/unaccredited/UKPathfinder1.info igtf-policy-bundle-1.140/src/unaccredited/UKPathfinder1.info --- igtf-policy-bundle-1.133/src/unaccredited/UKPathfinder1.info 2025-02-11 20:08:18.000000000 +0000 +++ igtf-policy-bundle-1.140/src/unaccredited/UKPathfinder1.info 2026-03-25 13:54:45.000000000 +0000 @@ -8,6 +8,6 @@ crl_url = http://crl.ca.ngs.ac.uk/crl/pathfinder.crl.der email = support@grid-support.ac.uk status = unaccredited -version = 1.133 +version = 1.140 sha1fp.0 = EA:03:D7:90:9A:82:6D:01:56:AA:C0:82:1C:7C:4C:1E:DA:89:FD:4A subjectdn = "/C=UK/O=eScience/OU=Authority/CN=Pathfinder1" diff -Nru igtf-policy-bundle-1.133/src/unaccredited/egee-ne-benelux-tutorial.info igtf-policy-bundle-1.140/src/unaccredited/egee-ne-benelux-tutorial.info --- igtf-policy-bundle-1.133/src/unaccredited/egee-ne-benelux-tutorial.info 2025-02-11 20:08:23.000000000 +0000 +++ igtf-policy-bundle-1.140/src/unaccredited/egee-ne-benelux-tutorial.info 2026-03-25 13:54:46.000000000 +0000 @@ -6,6 +6,6 @@ url = http://ca.dutchgrid.nl/egee-ne/ ca_url = http://ca.dutchgrid.nl/egee-ne/cacert.pem status = unaccredited -version = 1.133 +version = 1.140 sha1fp.0 = 20:BC:72:7B:46:28:F2:6C:6E:54:D2:98:E2:2E:83:AC:1B:14:4C:A0 subjectdn = "/DC=org/DC=egee-ne/OU=Training Services/CN=Worthless EGEE Northern and Benelux Tutorial CA 1" diff -Nru igtf-policy-bundle-1.133/src/unaccredited/nl-e-infra-zero.info igtf-policy-bundle-1.140/src/unaccredited/nl-e-infra-zero.info --- igtf-policy-bundle-1.133/src/unaccredited/nl-e-infra-zero.info 2025-02-11 20:08:27.000000000 +0000 +++ igtf-policy-bundle-1.140/src/unaccredited/nl-e-infra-zero.info 2026-03-25 13:54:48.000000000 +0000 @@ -6,6 +6,6 @@ url = http://ca.dutchgrid.nl/nl-e-infra-zero/ ca_url = http://ca.dutchgrid.nl/nl-e-infra-zero/cacert.pem status = unaccredited -version = 1.133 +version = 1.140 sha1fp.0 = 43:20:7D:DF:E9:DD:F0:71:86:CA:AB:DC:97:44:F8:96:25:ED:6C:66 subjectdn = "/DC=nl/DC=e-infra/OU=Certification Authorities/CN=Worthless NL e-Infra Zero Tutorial CA 1"