超越挂锁:为何证书透明度正在重塑互联网信任

  • The Need for Certificate Transparency: The internet's security is built on trust in certificate authorities (CAs), but history shows they can go rogue. Certificate Transparency was introduced to make trust verifiable and transparent.
  • The Problem with the Current Model: The green padlock in the browser's address bar relied on CAs to verify website identities, but this model was easily abused due to nation-state interference and sloppy operational hygiene. There was no public record of issued certificates, allowing abuse to go undetected.
  • How Certificate Transparency Works: It uses an append-only, cryptographically verifiable log of all certificates issued by compliant CAs. The process involves CSR generation, certificate issuance, log submission, SCT generation and delivery, and browser enforcement.
  • Building a Secure CT Ecosystem: It requires a system of monitors, auditors, and clients. CT logs must follow strict requirements, and tools like crt.sh and open-source libraries help engineers use CT.
  • CT in Action: Tools like crt.sh and Google's Certificate Transparency Log List help engineers monitor and detect rogue certificates. Real-world adoption includes Facebook, Cloudflare, and Let's Encrypt.
  • CT Monitoring via GitHub Actions: Teams can automate certificate monitoring using GitHub Actions. They can also verify SCTs during audits.
  • The Road Ahead: Future innovations aim to address remaining trust gaps, such as the Static Sunlight API, Delegated Credentials, Post-Quantum Certificates, Gossip Protocols, and Reimagining CA Governance.
  • References & Further Reading: Various resources including official CT project sites, RFCs, and open-source tools provide more information on CT.
阅读 28
0 条评论