Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto/tls: add support for Certificate Transparency TLS extension #10201

Closed
titanous opened this issue Mar 20, 2015 · 4 comments
Closed

crypto/tls: add support for Certificate Transparency TLS extension #10201

titanous opened this issue Mar 20, 2015 · 4 comments
Milestone

Comments

@titanous
Copy link
Member

I'd like to be able to serve SCTs via the TLS extension with crypto/tls, similar to how the Certificate struct supports an OCSPStaple. I'm happy to put it together and submit a CL if the feature would be accepted.

/cc @agl

@rsc
Copy link
Contributor

rsc commented Apr 10, 2015

Adam, does this sound reasonable to you? Thanks.

@rsc rsc added this to the Go1.5Maybe milestone Apr 10, 2015
@rsc rsc changed the title crypto/tls: Add support for Certificate Transparency TLS extension crypto/tls: add support for Certificate Transparency TLS extension Apr 10, 2015
@agl agl self-assigned this Apr 12, 2015
@agl
Copy link
Contributor

agl commented Apr 12, 2015

Yes, this is reasonable and very similar to OCSP stapling that's currently supported.

@titanous
Copy link
Member Author

@gopherbot
Copy link

CL https://golang.org/cl/8988 mentions this issue.

@agl agl closed this as completed in 02e69c4 Apr 26, 2015
@mikioh mikioh modified the milestones: Go1.5, Go1.5Maybe May 15, 2015
@golang golang locked and limited conversation to collaborators Jun 25, 2016
FiloSottile pushed a commit to FiloSottile/go that referenced this issue Oct 12, 2018
This change adds support for serving and receiving Signed Certificate
Timestamps as described in RFC 6962.

The server is now capable of serving SCTs listed in the Certificate
structure. The client now asks for SCTs and, if any are received,
they are exposed in the ConnectionState structure.

Fixes golang#10201

Change-Id: Ib3adae98cb4f173bc85cec04d2bdd3aa0fec70bb
Reviewed-on: https://go-review.googlesource.com/8988
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com>
FiloSottile pushed a commit to FiloSottile/go that referenced this issue Oct 12, 2018
This change adds support for serving and receiving Signed Certificate
Timestamps as described in RFC 6962.

The server is now capable of serving SCTs listed in the Certificate
structure. The client now asks for SCTs and, if any are received,
they are exposed in the ConnectionState structure.

Fixes golang#10201

Change-Id: Ib3adae98cb4f173bc85cec04d2bdd3aa0fec70bb
Reviewed-on: https://go-review.googlesource.com/8988
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com>
@rsc rsc unassigned agl Jun 23, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

5 participants