Page MenuHomeFreeBSD

security/py-pnu-certwatch: new port
ClosedPublic

Authored by jadawin on Mar 26 2024, 10:26 AM.
Tags
None
Referenced Files
Unknown Object (File)
Fri, Apr 26, 4:29 AM
Unknown Object (File)
Mar 31 2024, 5:28 PM
Unknown Object (File)
Mar 28 2024, 2:06 AM
Unknown Object (File)
Mar 26 2024, 11:07 AM
Subscribers
None

Details

Reviewers
bapt
Summary

The certwatch utility monitors X509 certificates expiration dates by
processing one or more data files containing lists of hostnames with
optional port numbers.

It's mainly used to check the expiration date of HTTPS certificates
(which is the default target when the port number is not indicated),
but the tool is protocol-agnostic and can "talk" to any SNI-aware
(Server Name Information) SSL/TLS server (smtps, imaps, ldaps, etc.)
without making too much assumptions on the correctness of servers
certificates.

The certificates can be saved to a specified directory for further
analysis with other tools (such as OpenSSL).

The tool's results are presented as text tables.

The main one is the list of certificates successfully fetched, ordered
by expiration date. This list can be filtered to only show
certificates expired or expiring within the specified number of days.

The second table is the sorted list of hostnames / hostports where
certificates couldn't be fetched, with our best attempts to identify
the reason why.

Two additional tables can be generated in order to print the common
names and alternate names unmentioned in your input data files.

Finally, for user convenience, all these reports can be generated in a
single multi-tabs Excel workbook.

PR: 277970
Approved by: maintainer, bapt (mentor)

Diff Detail

Repository
R11 FreeBSD ports repository
Lint
Lint Skipped
Unit
Tests Skipped
Build Status
Buildable 56784
Build 53672: arc lint + arc unit

Event Timeline

jadawin created this revision.
This revision is now accepted and ready to land.Mar 26 2024, 10:30 AM

Committed! Thanks for your review