Suspicious CA revoke tool (scart) Use to revoke built-in Suspicious CA, avoiding possible MiTM by CN GOV
- bash
- jq
- openssl-util
bash ./scart
# OR
curl -L https://raw.githubusercontent.com/fcshark-org/scart/refs/heads/main/scart | bashCERTSCONF=/etc/ca-certificates.conf
sudo sed -i 's|^\!||' "$CERTSCONF"
sudo update-ca-certificatesSRCCONF_HIGHT=/etc/ca-certificates/trust-source
BLOCKSUBDIR=blocklist
sudo rm -f "$SRCCONF_HIGHT/$BLOCKSUBDIR"/*
sudo update-ca-trustRH_SRCCONF_HIGHT=/etc/pki/ca-trust/source
RH_BLOCKSUBDIR=blocklist
sudo rm -f "$RH_SRCCONF_HIGHT/$RH_BLOCKSUBDIR"/*
sudo update-ca-trustopkg update
opkg install --force-reinstall ca-bundle ca-certificates
# OR
apk update
apk fix ca-bundle ca-certificates#!/usr/bin/env bash
# Depends: bash openssl-util
ETCCERTSDIR=/etc/ssl/certs
SUFFIX=0
Country=US
# func <Country code> <file>
isCountryCA() {
local _ISSUER="$(openssl x509 -issuer -nameopt=lname -noout -in "$2")"
grep -q "countryName=$1" <<< "$_ISSUER"
}
# Main
cd "$ETCCERTSDIR"
find * -name '*.'"$SUFFIX" | while read -r _cert; do
isCountryCA "$Country" "$_cert" && readlink "$_cert"
done