Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Mar 2024 07:36:00 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 277970] security/py-pnu-certwatch: new port
Message-ID:  <bug-277970-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277970

            Bug ID: 277970
           Summary: security/py-pnu-certwatch: new port
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://github.com/HubTou/certwatch
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: hubert.tournier@gmail.com

Created attachment 249490
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D249490&action=
=3Dedit
git format-patch for py-pnu-certwatch

Hello,

This is a new port for my pnu-certwatch Python package:

=3D=3D=3D=3D=3D 8< =3D=3D=3D=3D=3D
The certwatch utility monitors X509 certificates expiration dates by
processing one or more data files containing lists of hostnames with
optional port numbers.

It's mainly used to check the expiration date of HTTPS certificates
(which is the default target when the port number is not indicated),
but the tool is protocol-agnostic and can "talk" to any SNI-aware
(Server Name Information) SSL/TLS server (smtps, imaps, ldaps, etc.)
without making too much assumptions on the correctness of servers
certificates.

The certificates can be saved to a specified directory for further
analysis with other tools (such as OpenSSL).

The tool's results are presented as text tables.

The main one is the list of certificates successfully fetched, ordered
by expiration date. This list can be filtered to only show
certificates expired or expiring within the specified number of days.

The second table is the sorted list of hostnames / hostports where
certificates couldn't be fetched, with our best attempts to identify
the reason why.

Two additional tables can be generated in order to print the common
names and alternate names unmentioned in your input data files.

Finally, for user convenience, all these reports can be generated in a
single multi-tabs Excel workbook.
=3D=3D=3D=3D=3D 8< =3D=3D=3D=3D=3D

This might be useful to those who manage a lot of TLS/SSL certificates or a=
re
interested in their study...

Best regards,

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-277970-7788>