git: d3c43b50d8 - main - remove stale cgi script /cgi/fingerprints.cgi

From: Wolfram Schneider <wosch_at_FreeBSD.org>
Date: Mon, 06 Feb 2023 06:57:16 UTC
The branch main has been updated by wosch:

URL: https://cgit.FreeBSD.org/doc/commit/?id=d3c43b50d8ab5894cb199ae31b41558e097c5a1a

commit d3c43b50d8ab5894cb199ae31b41558e097c5a1a
Author:     Wolfram Schneider <wosch@FreeBSD.org>
AuthorDate: 2023-02-06 06:56:07 +0000
Commit:     Wolfram Schneider <wosch@FreeBSD.org>
CommitDate: 2023-02-06 06:56:07 +0000

    remove stale cgi script /cgi/fingerprints.cgi
    
    The script fingerprints.cgi is no longer really in use and there are
    better tools as ldns-dane(1) to validation TLSA records.
    
    Approved by: peter, philip
---
 website/content/en/cgi/fingerprints.cgi | 58 ---------------------------------
 1 file changed, 58 deletions(-)

diff --git a/website/content/en/cgi/fingerprints.cgi b/website/content/en/cgi/fingerprints.cgi
deleted file mode 100755
index bc99be8985..0000000000
--- a/website/content/en/cgi/fingerprints.cgi
+++ /dev/null
@@ -1,58 +0,0 @@
-#!/usr/bin/perl -T
-#
-# Display current HTTPS/SSL/TLS certificate fingerprints.
-# Should be replaced with something better.
-#
-# $FreeBSD$
-
-require "./cgi-lib.pl";
-require "./cgi-style.pl";
-$ENV{PATH} = '/bin:/usr/bin';
-
-# There is an internal post-renew propagation window of about 5-10 minutes.
-# However, the script is expensive so we leverage the cache.  The problem
-# is that people could come here immediately after a fingerprint mismatch
-# so we have to be quick to update.
-print "Cache-control: public; max-age=120\n";	# 2 minutes
-print &short_html_header("FreeBSD HTTPS/SSL/TLS Server Certificate Fingerprints");
-
-print qq{<h1>FreeBSD HTTPS/SSL/TLS Server Certificate Fingerprints</h1>\n};
-print qq{<p>The FreeBSD Project makes use of <a href="https://letsencrypt.org">Let's Encrypt</a> certificates for many of its HTTPS/SSL/TLS services.  These certificates are automatically updated every 60 days.  The current certificate fingerprints of significant services are listed below.</p>\n};
-
-# Note: These are all case sensitive.  Use lower case to match the file names.
-&Fingerprint('git.freebsd.org');
-&Fingerprint('svn.freebsd.org');
-&Fingerprint('download.freebsd.org');
-&Fingerprint('pkg.freebsd.org');
-
-print qq{<p>These fingerprints may be helpful in situations where automatic verification is not available.</p>\n};
-print &html_footer;
-exit 0;
-
-sub Fingerprint
-{
-    my ($domain) = @_;
-
-    my $message;
-    my $sha1, $sha256;
-    if ( -e "/etc/clusteradm/acme-certs/$domain.crt" ) {
-	$sha1 = `/usr/bin/openssl x509 -fingerprint -noout -sha1 -in /etc/clusteradm/acme-certs/$domain.crt`;
-	$sha256 = `/usr/bin/openssl x509 -fingerprint -noout -sha256 -in /etc/clusteradm/acme-certs/$domain.crt`;
-	chomp($sha1);
-	chomp($sha256);
-	$sha1 =~ s/^.*=//;
-	$sha256 =~ s/^.*=//;
-    } else {
-	$sha1 = 'Error';
-	$sha256 = 'Error';
-    }
-
-    $message = qq{<p>The fingerprints of the current <b>$domain</b> certificate are:</p>\n};
-    $message .= qq{<div class="informaltable"><table border="1"><colgroup><col /><col /></colgroup>};
-    $message .= qq{<thead><tr><th>Hash</th><th>Fingerprint</th></tr></thead><tbody>};
-    $message .= qq{<tr><td>SHA1</td><td><code class="literal">$sha1</code></td></tr>};
-    $message .= qq{<tr><td>SHA256</td><td><code class="literal">$sha256</code></td></tr>};
-    $message .= qq{</tbody></table></div>\n};
-
-    print $message;
-}