Description
Certificate Transparency is an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs. Logs are network services that implement the protocol operations for submissions and queries that are defined in this document. (q.v. IETF RFC 6962)
...
- Google launched its first certificate transparency log in March 2013. According to the list of known logs, there are 14 logs operated by 8 organizations.
- In September 2013, DigiCert became the first certificate authority to implement Certificate Transparency.
- Google Chrome began requiring Certificate Transparency for newly issued Extended Validation Certificates in 2015.
Here are some additional thoughts on verifiable data structures from the specification author.
Champion / Stakeholder
Actors
...
- Add to Log
- Retrieve information from Log
- Retrieve proof from Log
End State
tbd
Success
tbd
Failure
tbd