Package: ca-certificates
Version: 20230311
Severity: normal
File: /usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt

I noticed that there is one expired certificate in ca-certificates:

   $ cat test
   now=$(date -u)
   date -d "$now"
   now="$(date -d "$now" +%s)"
   for f in /usr/share/ca-certificates/mozilla/* ; do
    date="$(openssl x509 -enddate -noout -in "$f" | cut -d= -f2)"
    d="$(date -d "$date" +%s)"
    if [ $((d<=now)) -eq 1 ] ; then
     echo Expired: $f $date $d $now
    fi
   done

   $ sh test
   Sun 12 Mar 2023 10:17:20 AWST
   Expired: 
/usr/share/ca-certificates/mozilla/E-Tugra_Certification_Authority.crt Mar 3 
12:09:48 2023 GMT 1677845388 1678587440

-- System Information:
Debian Release: bookworm/sid
  APT prefers testing-security
  APT policy: (950, 'testing-security'), (900, 'testing-debug'), (900, 
'testing'), (800, 'unstable-debug'), (800, 'unstable'), (790, 
'buildd-unstable'), (700, 'experimental-debug'), (700, 'experimental'), (690, 
'buildd-experimental')
merged-usr: no
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-6-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_AU.utf8, LC_CTYPE=en_AU.utf8 (charmap=UTF-8), LANGUAGE=en_AU:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ca-certificates depends on:
ii  debconf [debconf-2.0]  1.5.82
ii  openssl                3.0.8-1

ca-certificates recommends no packages.

ca-certificates suggests no packages.

-- debconf information excluded

-- 
bye,
pabs

https://wiki.debian.org/PaulWise

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to