This is the root certificate, back to which all server certificates signed by the firedrake.org certification authority can be traced. If you're running a recent SSL-enabled web browser, you can install the certificate directly by clicking here. If you want to do something else with it - for example, using it with fetchmail-ssl - you will probably find it easier to cut and paste this block.
-----BEGIN CERTIFICATE----- MIICoTCCAgoCCQCvla0Hdt4yHjANBgkqhkiG9w0BAQUFADCBlDELMAkGA1UEBhMC VUsxDzANBgNVBAcTBkxvbmRvbjEcMBoGA1UEChMTRmlyZWRyYWtlIFN5bnRoZXNp czEeMBwGA1UECxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MRUwEwYDVQQDEwxGaXJl ZHJha2UgQ0ExHzAdBgkqhkiG9w0BCQEWEGNhQGZpcmVkcmFrZS5vcmcwHhcNMTEx MTIwMTEyNzQ4WhcNMjExMTE3MTEyNzQ4WjCBlDELMAkGA1UEBhMCVUsxDzANBgNV BAcTBkxvbmRvbjEcMBoGA1UEChMTRmlyZWRyYWtlIFN5bnRoZXNpczEeMBwGA1UE CxMVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MRUwEwYDVQQDEwxGaXJlZHJha2UgQ0Ex HzAdBgkqhkiG9w0BCQEWEGNhQGZpcmVkcmFrZS5vcmcwgZ8wDQYJKoZIhvcNAQEB BQADgY0AMIGJAoGBAN3pHiNic4wTL5g/rNXSng7SChCMJGq0wMOVffdvKCMBQ25J /cueWAywNwjoNdxL26wBprFblq3p9TIGm0YP0to+wfmrUPkFtu0EE/4naulgzu9Q KL4DVfgJUce/2txN0hdHD1P2zvvc6iRnn2jBnuIiySC3FC2DEbF1RJIBxZnFAgMB AAEwDQYJKoZIhvcNAQEFBQADgYEAs/B0eqrefYzMeH3WD4+qWRIIXn7t3AYzfDsz nsI2zrbbxzcrgB5kuO9z1d3heKUEoIf3UO/e3Fm2aX4CNbsoVDZMnRBqL6Fkvm9J cO+7WNTBEFloCEUimMN6ifc3fy+de+p35KAJggKSQtgmpxh5b3FUkW3dLPZU/v+X te7f4MU= -----END CERTIFICATE-----Naturally, I don't expect you to trust this page. After all, all the things which SSL is designed to prevent could already have happened. So here is a GPG signature for the key:
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iD8DBQBOyOaJc7+Wq6A2HzQRAzZKAJ92WYrUwkXq0v2kzaS9/oEtd5zBhQCg0MT6 ZD0BXsy3wvGCqoN8NFbZUBs= =t1Aa -----END PGP SIGNATURE-----This signature can be checked against my GPG key, which is already on the public key-servers: the ID is 0xA0361F34.