How to Install and Uninstall certspotter Package on Ubuntu 21.04 (Hirsute Hippo)

Last updated: May 06,2024

1. Install "certspotter" package

This guide let you learn how to install certspotter on Ubuntu 21.04 (Hirsute Hippo)

$ sudo apt update $ sudo apt install certspotter

2. Uninstall "certspotter" package

This guide covers the steps necessary to uninstall certspotter on Ubuntu 21.04 (Hirsute Hippo):

$ sudo apt remove certspotter $ sudo apt autoclean && sudo apt autoremove

3. Information about the certspotter package on Ubuntu 21.04 (Hirsute Hippo)

Package: certspotter
Architecture: amd64
Version: 0.10-1
Built-Using: golang-1.15 (= 1.15.4-1ubuntu1), golang-github-mreiferson-go-httpclient (= 0.0~git20160630.0.31f0106-2), golang-golang-x-net (= 1:0.0+git20201031.ff519b6+dfsg-1), golang-golang-x-text (= 0.3.4-1)
Priority: optional
Section: universe/devel
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Go Packaging Team
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 10335
Depends: libc6 (>= 2.32)
Filename: pool/universe/c/certspotter/certspotter_0.10-1_amd64.deb
Size: 2097496
MD5sum: f5d110af14d0c1bf9cae44d17434aa72
SHA1: 25d72a2adf39133b9dacf84f3007d39c40d67c4e
SHA256: 232124f9348abdf0597f2d3a38148a783499d9d4f6d437db7a679caf62533fcb
SHA512: 2d801b1f884d4ce0b59ec3eb8f06691f9baea96f15e0febd48931e72516980db6b49854741326d714f924dbbe61b90351a9382a07e3e1e31e22c7b593da37ad6
Homepage: https://github.com/SSLMate/certspotter
Description-en: Certificate Transparency Log Monitor
Cert Spotter is a Certificate Transparency log monitor from SSLMate that
alerts you when a SSL/TLS certificate is issued for one of your domains.
Cert Spotter is easier than other open source CT monitors, since it does
not require a database. It's also more robust, since it uses a special
certificate parser that ensures it won't miss certificates.
.
Cert Spotter is also available as a hosted service by SSLMate,

.
You can use Cert Spotter to detect:
* Certificates issued to attackers who have compromised a certificate
authority and want to impersonate your site.
* Certificates issued to attackers who are using your infrastructure
to serve malware.
* Certificates issued in violation of your corporate policy
or outside of your centralized certificate procurement process.
* Certificates issued to your infrastructure providers without your
consent.
Description-md5: dcd7ea2910639d061748abb8f430bfd1