Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Matty9191/ssl-cert-check
Send notifications when SSL certificates are about to expire.
https://github.com/Matty9191/ssl-cert-check
Last synced: 5 days ago
JSON representation
Send notifications when SSL certificates are about to expire.
- Host: GitHub
- URL: https://github.com/Matty9191/ssl-cert-check
- Owner: Matty9191
- License: gpl-2.0
- Created: 2015-12-01T20:57:25.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2024-08-20T10:57:18.000Z (3 months ago)
- Last Synced: 2024-10-05T14:18:43.527Z (about 1 month ago)
- Language: Shell
- Homepage:
- Size: 84 KB
- Stars: 729
- Watchers: 51
- Forks: 286
- Open Issues: 93
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SSL Certification Expiration Checker:
ssl-cert-check is a Bourne shell script that can be used to report on expiring SSL certificates. The script was designed to be run from cron and can e-mail warnings or log alerts through nagios.
# Usage:
$ ./ssl-cert-check
Usage: ./ssl-cert-check [ -e email address ] [ -E sender email address ] [ -x days ] [-q] [-a] [-b] [-h] [-i] [-n] [-N] [-v]
{ [ -s common_name ] && [ -p port] } || { [ -f cert_file ] } || { [ -c cert file ] } || { [ -d cert dir ] }"-a : Send a warning message through E-mail
-b : Will not print header
-c cert file : Print the expiration date for the PEM or PKCS12 formatted certificate in cert file
-d cert directory : Print the expiration date for the PEM or PKCS12 formatted certificates in cert directory
-e E-mail address : E-mail address to send expiration notices
-E E-mail address : Sender E-mail address
-f cert file : File with a list of FQDNs and ports
-h : Print this screen
-i : Print the issuer of the certificate
-k password : PKCS12 file password
-n : Run as a Nagios plugin
-N : Run as a Nagios plugin and output one line summary (implies -n, requires -f or -d)
-p port : Port to connect to (interactive mode)
-s commmon name : Server to connect to (interactive mode)
-t type : Specify the certificate type
-q : Don't print anything on the console
-v : Specify a specific protocol version to use (tls, ssl2, ssl3)
-V : Only print validation data
-x days : Certificate expiration interval (eg. if cert_date < days)# Examples:
Print the expiration times for one or more certificates listed in ssldomains:
$ ssl-cert-check -f ssldomains
Host Status Expires Days Left
----------------------------------------------- ------------ ------------ ----------
www.prefetch.com:443 Valid May 23 2006 218
mail.prefetch.net:993 Valid Jun 20 2006 246
gmail.google.com:443 Valid Jun 7 2006 233
www.sun.com:443 Valid May 11 2009 1302
www.spotch.com:443 Connection refused Unknown UnknownCheck all certificates with file pattern "/etc/haproxy/ssl/\*.pem"
$ ssl-cert-check -d "/etc/haproxy/ssl/*.pem"
Host Status Expires Days
----------------------------------------------- ------------ ------------ ----
FILE:/etc/haproxy/ssl/example1.org.pem Valid Jan 6 2017 78
FILE:/etc/haproxy/ssl/example2.org.pem Valid Jan 1 2017 73
FILE:/etc/haproxy/ssl/example3.org.pem Valid Jan 6 2017 78Send an e-mail to [email protected] if a domain listed in ssldomains will expire in the next 60-days:
$ ssl-cert-check -a -f ssldomains -q -x 60 -e [email protected]# Additional Documentation
Documentation And Examples: http://prefetch.net/articles/checkcertificate.html