Created attachment 249490 [details] git format-patch for py-pnu-certwatch Hello, This is a new port for my pnu-certwatch Python package: ===== 8< ===== The certwatch utility monitors X509 certificates expiration dates by processing one or more data files containing lists of hostnames with optional port numbers. It's mainly used to check the expiration date of HTTPS certificates (which is the default target when the port number is not indicated), but the tool is protocol-agnostic and can "talk" to any SNI-aware (Server Name Information) SSL/TLS server (smtps, imaps, ldaps, etc.) without making too much assumptions on the correctness of servers certificates. The certificates can be saved to a specified directory for further analysis with other tools (such as OpenSSL). The tool's results are presented as text tables. The main one is the list of certificates successfully fetched, ordered by expiration date. This list can be filtered to only show certificates expired or expiring within the specified number of days. The second table is the sorted list of hostnames / hostports where certificates couldn't be fetched, with our best attempts to identify the reason why. Two additional tables can be generated in order to print the common names and alternate names unmentioned in your input data files. Finally, for user convenience, all these reports can be generated in a single multi-tabs Excel workbook. ===== 8< ===== This might be useful to those who manage a lot of TLS/SSL certificates or are interested in their study... Best regards,
A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/ports/commit/?id=4ede5b61f28e82a74af0fca197a75e2db2039ac9 commit 4ede5b61f28e82a74af0fca197a75e2db2039ac9 Author: Philippe Audeoud <jadawin@FreeBSD.org> AuthorDate: 2024-03-26 10:21:37 +0000 Commit: Philippe Audeoud <jadawin@FreeBSD.org> CommitDate: 2024-03-26 11:02:11 +0000 security/py-pnu-certwatch: new port The certwatch utility monitors X509 certificates expiration dates by processing one or more data files containing lists of hostnames with optional port numbers. It's mainly used to check the expiration date of HTTPS certificates (which is the default target when the port number is not indicated), but the tool is protocol-agnostic and can "talk" to any SNI-aware (Server Name Information) SSL/TLS server (smtps, imaps, ldaps, etc.) without making too much assumptions on the correctness of servers certificates. The certificates can be saved to a specified directory for further analysis with other tools (such as OpenSSL). The tool's results are presented as text tables. The main one is the list of certificates successfully fetched, ordered by expiration date. This list can be filtered to only show certificates expired or expiring within the specified number of days. The second table is the sorted list of hostnames / hostports where certificates couldn't be fetched, with our best attempts to identify the reason why. Two additional tables can be generated in order to print the common names and alternate names unmentioned in your input data files. Finally, for user convenience, all these reports can be generated in a single multi-tabs Excel workbook. PR: 277970 Approved by: maintainer, bapt (mentor) security/Makefile | 1 + security/py-pnu-certwatch/Makefile (new) | 27 +++++++++++++++++++++++++++ security/py-pnu-certwatch/distinfo (new) | 3 +++ security/py-pnu-certwatch/pkg-descr (new) | 29 +++++++++++++++++++++++++++++ 4 files changed, 60 insertions(+)
Added to ports/. Thank you!