- The Need for Certificate Transparency: The internet's security is built on trust in certificate authorities (CAs), but history shows they can go rogue. Certificate Transparency was introduced to make trust verifiable and transparent.
- The Problem with the Current Model: The green padlock in the browser's address bar relied on CAs to verify website identities, but this model was easily abused due to nation-state interference and sloppy operational hygiene. There was no public record of issued certificates, allowing abuse to go undetected.
- How Certificate Transparency Works: It uses an append-only, cryptographically verifiable log of all certificates issued by compliant CAs. The process involves CSR generation, certificate issuance, log submission, SCT generation and delivery, and browser enforcement.
- Building a Secure CT Ecosystem: It requires a system of monitors, auditors, and clients. CT logs must follow strict requirements, and tools like crt.sh and open-source libraries help engineers use CT.
- CT in Action: Tools like crt.sh and Google's Certificate Transparency Log List help engineers monitor and detect rogue certificates. Real-world adoption includes Facebook, Cloudflare, and Let's Encrypt.
- CT Monitoring via GitHub Actions: Teams can automate certificate monitoring using GitHub Actions. They can also verify SCTs during audits.
- The Road Ahead: Future innovations aim to address remaining trust gaps, such as the Static Sunlight API, Delegated Credentials, Post-Quantum Certificates, Gossip Protocols, and Reimagining CA Governance.
- References & Further Reading: Various resources including official CT project sites, RFCs, and open-source tools provide more information on CT.
**粗体** _斜体_ [链接](http://example.com) `代码` - 列表 > 引用
。你还可以使用@
来通知其他用户。