How to Install and Uninstall certspotter Package on Ubuntu 20.10 (Groovy Gorilla)

Last updated: December 28,2024

1. Install "certspotter" package

Learn how to install certspotter on Ubuntu 20.10 (Groovy Gorilla)

$ sudo apt update $ sudo apt install certspotter

2. Uninstall "certspotter" package

Here is a brief guide to show you how to uninstall certspotter on Ubuntu 20.10 (Groovy Gorilla):

$ sudo apt remove certspotter $ sudo apt autoclean && sudo apt autoremove

3. Information about the certspotter package on Ubuntu 20.10 (Groovy Gorilla)

Package: certspotter
Architecture: amd64
Version: 0.9-2build1
Built-Using: golang-1.14 (= 1.14.7-2ubuntu1), golang-github-mreiferson-go-httpclient (= 0.0~git20160630.0.31f0106-2), golang-golang-x-net (= 1:0.0+git20200226.491c5fc+dfsg-1), golang-golang-x-text (= 0.3.3-1)
Priority: optional
Section: universe/devel
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Go Packaging Team
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 11255
Depends: libc6 (>= 2.32)
Filename: pool/universe/c/certspotter/certspotter_0.9-2build1_amd64.deb
Size: 2303724
MD5sum: ab099bce7e3b3761e1c9ac93c71b97b1
SHA1: 26fe363422e1542d375387a997cb0814872e64b6
SHA256: 2025b408680d0868cd50116ce63b1c2e9c95e148f90b84d3ef5e6fe72aa80c2e
SHA512: 57f41220f87cc35971adb61e987b98b53e61a7b815372d7340819157938a2ba4625268480517a5f9d9373fd4ed2a8176d696c95c5932a4b8f4bc0e0736b4db17
Homepage: https://github.com/SSLMate/certspotter
Description-en: Certificate Transparency Log Monitor
Cert Spotter is a Certificate Transparency log monitor from SSLMate that
alerts you when a SSL/TLS certificate is issued for one of your domains.
Cert Spotter is easier than other open source CT monitors, since it does
not require a database. It's also more robust, since it uses a special
certificate parser that ensures it won't miss certificates.
.
Cert Spotter is also available as a hosted service by SSLMate,

.
You can use Cert Spotter to detect:
* Certificates issued to attackers who have compromised a certificate
authority and want to impersonate your site.
* Certificates issued to attackers who are using your infrastructure
to serve malware.
* Certificates issued in violation of your corporate policy
or outside of your centralized certificate procurement process.
* Certificates issued to your infrastructure providers without your
consent.
Description-md5: dcd7ea2910639d061748abb8f430bfd1