Provided by: certspotter_0.18.0-1_amd64 bug

NAME

       certspotter - Certificate Transparency Log Monitor

SYNOPSIS

       certspotter [-start_at_end] [-watchlist FILENAME] [-email ADDRESS] ...

DESCRIPTION

       Cert Spotter is a Certificate Transparency log monitor from SSLMate that alerts you when a
       SSL/TLS certificate is issued for one of your domains.  Cert Spotter is easier to use than
       other  open  source  CT  monitors,  since  it  does not require a database. It’s also more
       robust,  since  it  uses  a  special  certificate  parser  that  ensures  it  won’t   miss
       certificates.

       Cert    Spotter    is    also    available    as    a    hosted    service   by   SSLMate,
       https://sslmate.com/certspotter.

       You can use Cert Spotter to detect:

       •  Certificates issued to attackers who have compromised your DNS and are redirecting your
          visitors to their malicious site.
       •  Certificates  issued  to attackers who have taken over an abandoned sub-domain in order
          to serve malware under your name.
       •  Certificates issued to attackers who have compromised a certificate authority and  want
          to impersonate your site.
       •  Certificates  issued  in  violation  of  your  corporate  policy  or  outside  of  your
          centralized certificate procurement process.

OPTIONS

       -batch_size NUMBER
          Maximum number of entries to request per call to get-entries.  You should not generally
          need to change this. Defaults to 1000.

       -email ADDRESS
          Email address to contact when a matching certificate is discovered, or an error occurs.
          You can specify this option more than once to email multiple  addresses.   Your  system
          must have a working sendmail(1) command.

          Regardless  of  the  -email  option,  certspotter  also  emails  any  address listed in
          $CERTSPOTTER_CONFIG_DIR/email_recipients   file   (~/.certspotter/email_recipients   by
          default).   (One address per line, blank lines are ignored.)  This file is read only at
          startup, so you must restart certspotter if you change it.

       -healthcheck INTERVAL
          Perform a health check at the given  interval  (default:  “24h”)  as  described  below.
          INTERVAL must be a decimal number followed by “h” for hours or “m” for minutes.

       -logs ADDRESS
          Filename  or  HTTPS  URL  of  a v2 or v3 JSON log list containing logs to monitor.  The
          schema        for        this        file        can        be         found         at
          https://www.gstatic.com/ct/log_list/v3/log_list_schema.json.         Defaults        to
          https://loglist.certspotter.org/monitor.json, which includes the union of  active  logs
          recognized  by Chrome and Apple.  certspotter periodically reloads the log list in case
          it has changed.

       -no_save
          Do not save a copy of matching certificates.

       -script COMMAND
          Command to execute when a matching  certificate  is  found  or  an  error  occurs.  See
          certspotter-script(8) for information about the interface to scripts.

          Regardless  of the -script option, certspotter also executes any executable file in the
          $CERTSPOTTER_CONFIG_DIR/hooks.d directory (~/.certspotter/hooks.d by default).

       -start_at_end
          Start monitoring logs from the end rather than the beginning.

          WARNING: monitoring from the beginning guarantees detection of  all  certificates,  but
          requires downloading hundreds of millions of certificates, which takes days.

       -state_dir PATH
          Directory   for   storing   state.   Defaults   to   $CERTSPOTTER_STATE_DIR,  which  is
          “~/.certspotter” by default.

       -stdout
          Write matching certificates and errors to stdout.

       -verbose
          Be verbose.

       -version
          Print version and exit.

       -watchlist PATH
          File containing DNS names to monitor, one  per  line.   To  monitor  an  entire  domain
          namespace (including the domain itself and all sub-domains) prefix the domain name with
          a dot (e.g. “.example.com”).  To monitor a single DNS name only, do not prefix the name
          with a dot.

          Defaults  to  $CERTSPOTTER_CONFIG_DIR/watchlist, which is “~/.certspotter/watchlist” by
          default.  Specify - to read the watch list from stdin.

          certspotter reads the watch list only when starting up, so you must restart certspotter
          if you change it.

NOTIFICATIONS

       When  certspotter  detects  a  certificate matching your watchlist, or encounters an error
       that is preventing it from discovering certificates, it notifies you as follows:

       •  Emails any address specified by the -email command line flag.

       •  Emails  any  address  listed  in  the   $CERTSPOTTER_CONFIG_DIR/email_recipients   file
          (~/.certspotter/email_recipients  by  default).  (One address per line, blank lines are
          ignored.)  This file is read only at startup, so you must restart  certspotter  if  you
          change it.

       •  Executes the script specified by the -script command line flag.

       •  Executes   every  executable  file  in  the  $CERTSPOTTER_CONFIG_DIR/hooks.d  directory
          (~/.certspotter/hooks.d by default).

       •  Writes the notification to standard out if the -stdout flag was specified.

       Sending email requires a working  sendmail(1)  command.   For  details  about  the  script
       interface, see certspotter-script(8).

OPERATION

       certspotter  continuously  monitors  all  browser-recognized Certificate Transparency logs
       looking for certificates which  are  valid  for  any  domain  on  your  watch  list.  When
       certspotter  detects  a  matching  certificate,  it  emails you, executes a script, and/or
       writes a report to standard out, as described above.

       certspotter also saves a copy of  matching  certificates  in  $CERTSPOTTER_STATE_DIR/certs
       (“~/.certspotter/certs” by default) unless you specify the -no_save option.

       When  certspotter  has  not previously monitored a log, it can either start monitoring the
       log from the beginning, or seek to the end of the log and  start  monitoring  from  there.
       Monitoring  from  the  beginning  guarantees  detection  of all certificates, but requires
       downloading hundreds of millions of certificates, which takes days. The  default  behavior
       is  to  monitor from the beginning. To start monitoring new logs from the end, specify the
       -start_at_end option.

       If certspotter has previously monitored a log, it resumes  monitoring  the  log  from  the
       previous  position.   This  means that if you add a domain to your watch list, certspotter
       will not detect any certificates that were logged prior to the addition.  To  detect  such
       certificates, you must delete $CERTSPOTTER_STATE_DIR/logs, which will cause certspotter to
       restart monitoring from the very beginning of each  log  (provided  -start_at_end  is  not
       specified).  This will cause certspotter to download hundreds of millions of certificates,
       which takes days.  To find preexisting certificates, it’s faster to use the  Cert  Spotter
       service  https://sslmate.com/certspotter,  SSLMate’s  Certificate  Transparency Search API
       https://sslmate.com/ct_search_api, or a CT search engine such as https://crt.sh.

ERROR HANDLING

       When certspotter encounters a problem with the local system (e.g. failure to write a  file
       or execute a script), it prints a message to stderr and exits with a non-zero status.

       When  certspotter encounters a problem monitoring a log, it prints a message to stderr and
       continues running.  It will try monitoring the  log  again  later;  most  log  errors  are
       transient.

       Every  24  hours  (unless  overridden by -healthcheck), certspotter performs the following
       health checks:

       •  Ensure that the log list has been  successfully  retrieved  at  least  once  since  the
          previous health check.
       •  Ensure  that every log has been successfully contacted at least once since the previous
          health check.
       •  Ensure that certspotter is not falling behind monitoring any logs.

       If any health check fails, certspotter notifies you by email, script, and/or standard out,
       as described above.

       Health  check failures should be rare, and you should take them seriously because it means
       certspotter might not detect all certificates.  It might also be an indication of  CT  log
       misbehavior.   Consult certspotter’s stderr output for details, and if you need help, file
       an issue at https://github.com/SSLMate/certspotter.

EXIT STATUS

       certspotter exits 0 when it receives SIGTERM or SIGINT, and non-zero when a serious  error
       occurs.

ENVIRONMENT

       CERTSPOTTER_STATE_DIR
          Directory for storing state. Overridden by -state_dir. Defaults to ~/.certspotter.

       CERTSPOTTER_CONFIG_DIR
          Directory  from  which any configuration, such as the watch list, is read.  Defaults to
          ~/.certspotter.

       HTTPS_PROXY
          URL of proxy server for making HTTPS requests.  http://, https://, and  socks5://  URLs
          are supported.  By default, no proxy server is used.

       SENDMAIL_PATH
          Path to the sendmail binary used for sending emails. Defaults to /usr/sbin/sendmail.

SEE ALSO

       certspotter-script(8)

COPYRIGHT

       Copyright © 2016-2023 Opsmate, Inc.

BUGS

       Report bugs to https://github.com/SSLMate/certspotter.

                                            2023-11-17                             certspotter(8)