This is the B4CKSP4CE internal Certificate Authority. It is used to sign certificates for internal services and infrastructure.
# Create a directory within ca-certificates, then download the root certificate
sudo mkdir -p /usr/share/ca-certificates/bksp
curl -fSsl https://ca.bksp.in/root/bksp-root.crt | sudo tee /usr/share/ca-certificates/bksp/B4CKSP4CE_Root_CA.crt
# Create a symbolic link in system trust store, then add the entry for ca-certificates configuration
echo "bksp/B4CKSP4CE_Root_CA.crt" | sudo tee -a /etc/ca-certificates.conf
# Update the system trust store
sudo update-ca-certificates
Please find a ssh-ed25519 public key and email address in the snippet below. Expect all replies to be signed with this key. You may encrypt your message using this key with age.
# Extract the public key from the Root CA certificate
curl -fSsl https://ca.bksp.in/root/bksp-root.crt | openssl x509 -noout -pubkey > root-ca.pub
# Download the contact proof signature
curl -fSsl https://ca.bksp.in/sig/noc-contact-proof.asc > noc-contact-proof.asc
# Verify the signature
echo -ne "Security: noc@bksp.in (ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJRwsb2wqvmakJnI9g8LQW5tTQJrgixFci/MTxSIEpq4)" | \
openssl dgst -sha256 -verify root-ca.pub -signature noc-contact-proof.asc -binary -
7B2F15A7C459B07D
C0:B8:B4:37:E5:58:C2:33:95:9E:2D:A7:61:43:A5:67:FE:51:A3:C4
1A:9F:4B:A1:BC:B5:F5:06:5D:54:57:3C:DA:CE:B6:B9:8C:63:F1:C5:7F:76:C2:09:A5:B3:9D:58:7E:08:B4:AF
Internal Devices CA.
34A52889EFA022F8
9D:89:CD:93:C2:50:90:55:C3:E5:9C:B5:5D:7E:CC:7D:7E:4C:71:BB
F0:88:CF:C8:8D:E0:89:55:D2:83:17:A2:D5:B4:E1:68:37:EC:33:FA:B7:F3:3A:0D:AA:6F:96:DD:DE:DD:1D:6F
.int.bksp.in
Internal Services CA.
6B47B45F6DB6EC8D
4B:79:3F:B4:A0:C4:84:3E:9A:69:49:B1:E1:2C:55:D1:17:2D:A4:F2
87:2B:BF:D9:5D:9B:B9:12:16:8A:DF:B9:E4:0B:81:32:08:39:96:42:11:A5:9E:60:0C:91:95:FD:91:FE:A5:3B
.svc.bksp.in