Skip to content

feat: add Certificate Transparency (SCT) checking to connect command #83

@danielewood

Description

@danielewood

Summary

Add Certificate Transparency verification to certkit connect. Currently, certkit does not check SCT (Signed Certificate Timestamp) validity — only chain verification, OCSP, and CRL.

Background

Observed while testing against invalid-expected-sct.badssl.com: Chrome reports net::ERR_CERT_AUTHORITY_INVALID and flags the SCT as "from unknown log". certkit correctly identifies the untrusted intermediate but has no CT awareness.

Scope

  • Parse SCTs embedded in the certificate (X.509v3 extension)
  • Parse SCTs delivered via TLS extension (ServerHello)
  • Validate SCTs against known CT logs (Google, Cloudflare, etc.)
  • Add diagnostics for missing/invalid SCTs
  • Add CT fields to --json output

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions