This is the root certificate, back to which all server certificates signed by the firedrake.org certification authority can be traced. If you're running a recent SSL-enabled web browser, you can install the certificate directly by clicking here. If you want to do something else with it - for example, using it with fetchmail-ssl - you will probably find it easier to cut and paste this block.

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Naturally, I don't expect you to trust this page. After all, all the things which SSL is designed to prevent could already have happened. So here is a GPG signature for the key:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQBOyOaJc7+Wq6A2HzQRAzZKAJ92WYrUwkXq0v2kzaS9/oEtd5zBhQCg0MT6
ZD0BXsy3wvGCqoN8NFbZUBs=
=t1Aa
-----END PGP SIGNATURE-----
This signature can be checked against my GPG key, which is already on the public key-servers: the ID is 0xA0361F34.