Summary
Add Certificate Transparency verification to certkit connect. Currently, certkit does not check SCT (Signed Certificate Timestamp) validity — only chain verification, OCSP, and CRL.
Background
Observed while testing against invalid-expected-sct.badssl.com: Chrome reports net::ERR_CERT_AUTHORITY_INVALID and flags the SCT as "from unknown log". certkit correctly identifies the untrusted intermediate but has no CT awareness.
Scope
- Parse SCTs embedded in the certificate (X.509v3 extension)
- Parse SCTs delivered via TLS extension (ServerHello)
- Validate SCTs against known CT logs (Google, Cloudflare, etc.)
- Add diagnostics for missing/invalid SCTs
- Add CT fields to
--json output
References