How to Install and Uninstall ca-cacert Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: November 23,2024
1. Install "ca-cacert" package
Please follow the instructions below to install ca-cacert on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
ca-cacert
Copied
2. Uninstall "ca-cacert" package
Please follow the steps below to uninstall ca-cacert on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
ca-cacert
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the ca-cacert package on Ubuntu 20.10 (Groovy Gorilla)
Package: ca-cacert
Architecture: all
Version: 2019.0411-2
Multi-Arch: foreign
Priority: optional
Section: universe/misc
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Dmitry Smirnov
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 22
Depends: ca-certificates (>= 20140223)
Enhances: ca-certificates
Filename: pool/universe/c/ca-cacert/ca-cacert_2019.0411-2_all.deb
Size: 7688
MD5sum: 1fe4e9b32ca59d2acc1a3ce1b3d100ae
SHA1: f55454de841bf48bc7e631912315c9e6fde53430
SHA256: ed2cd430ee8f05a51c9731d08e57964240f29a26db94c44b504669a831a3cd41
SHA512: 67ede10811d2d38177acbb1612060018baa03174a0e3cfad879ef9b473030c171273b4644d1b2b867658d4b0f2b49f93921bd5d0cfa66b070bb9d7a95b6979a0
Homepage: https://www.cacert.org
Description-en: CAcert.org root certificates
This package provides CAcert.org (sub-)root certificates in PEM format.
Root certificates allow SSL-based applications to check for the
authenticity of certificates issued by the CAcert authority.
.
CAcert.org is a community-driven Certificate Authority that issues
certificates to the public for free.
.
CAcert's goal is to promote awareness and education on computer security
through the use of encryption, specifically by providing cryptographic
certificates. These certificates can be used to digitally sign and encrypt
email, authenticate and authorize users connecting to websites and secure
data transmission over the internet. Any application that supports the
Secure Socket Layer Protocol (SSL or TLS) can make use of certificates
signed by CAcert, as can any application that uses X.509 certificates,
e.g. for encryption or code signing and document signatures.
.
Please note that CAcert may not yet comply with RFC 3647 or similar standards.
Description-md5: e2fefc6ea7db7d5726e39f8b82671250
Architecture: all
Version: 2019.0411-2
Multi-Arch: foreign
Priority: optional
Section: universe/misc
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Dmitry Smirnov
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 22
Depends: ca-certificates (>= 20140223)
Enhances: ca-certificates
Filename: pool/universe/c/ca-cacert/ca-cacert_2019.0411-2_all.deb
Size: 7688
MD5sum: 1fe4e9b32ca59d2acc1a3ce1b3d100ae
SHA1: f55454de841bf48bc7e631912315c9e6fde53430
SHA256: ed2cd430ee8f05a51c9731d08e57964240f29a26db94c44b504669a831a3cd41
SHA512: 67ede10811d2d38177acbb1612060018baa03174a0e3cfad879ef9b473030c171273b4644d1b2b867658d4b0f2b49f93921bd5d0cfa66b070bb9d7a95b6979a0
Homepage: https://www.cacert.org
Description-en: CAcert.org root certificates
This package provides CAcert.org (sub-)root certificates in PEM format.
Root certificates allow SSL-based applications to check for the
authenticity of certificates issued by the CAcert authority.
.
CAcert.org is a community-driven Certificate Authority that issues
certificates to the public for free.
.
CAcert's goal is to promote awareness and education on computer security
through the use of encryption, specifically by providing cryptographic
certificates. These certificates can be used to digitally sign and encrypt
email, authenticate and authorize users connecting to websites and secure
data transmission over the internet. Any application that supports the
Secure Socket Layer Protocol (SSL or TLS) can make use of certificates
signed by CAcert, as can any application that uses X.509 certificates,
e.g. for encryption or code signing and document signatures.
.
Please note that CAcert may not yet comply with RFC 3647 or similar standards.
Description-md5: e2fefc6ea7db7d5726e39f8b82671250