Please direct any questions to networks@eecs you may have.
UPDATE
[2012-01-13 07:07:28 | Aaron Culich]
Expired certs on wireless controllers have been replaced with the new Comodo/InCommon cert.
SHA1 Fingerprint=29:A7:67:CD:7E:93:FB:F8:3F:D3:94:7C:3C:9F:DF:9C:00:A0:8E:69
If you verify the certificate chain you should expect to see:
0 s:/C=US/postalCode=947201500/ST=California/L=Berkeley/street=200 California Hall #1500/O=University of California at Berkeley/OU=EECS/CN=webauth.eecs.berkeley.edu i:/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA 1 s:/C=US/O=Internet2/OU=InCommon/CN=InCommon Server CA i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root 2 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
Additional information about the Root CA and Intermediate CA certs is available on the CalNet LDAP SSL Public Key page.
https://wikihub.berkeley.edu/display/calnet/LDAP+SSL+Public+Key
The direct link to download the certs is below:
The Root CA cert is here:
https://support.comodo.com/index.php?_m=downloads&_a=viewdownload&downloaditemid=9
And the Intermediate Root CA cert is here:
https://wikihub.berkeley.edu/download/attachments/4228040/COMODOHigh-AssuranceSecureServerCA.crt
Resolved as of 2012-01-13 06:54:00