Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto/tls: add support for Certificate Transparency TLS extension #10201

Closed
titanous opened this issue Mar 20, 2015 · 4 comments
Closed

crypto/tls: add support for Certificate Transparency TLS extension #10201

titanous opened this issue Mar 20, 2015 · 4 comments
Assignees
Milestone

Comments

@titanous
Copy link
Member

@titanous titanous commented Mar 20, 2015

I'd like to be able to serve SCTs via the TLS extension with crypto/tls, similar to how the Certificate struct supports an OCSPStaple. I'm happy to put it together and submit a CL if the feature would be accepted.

/cc @agl

@rsc

This comment has been minimized.

Copy link
Contributor

@rsc rsc commented Apr 10, 2015

Adam, does this sound reasonable to you? Thanks.

@rsc rsc added this to the Go1.5Maybe milestone Apr 10, 2015
@rsc rsc changed the title crypto/tls: Add support for Certificate Transparency TLS extension crypto/tls: add support for Certificate Transparency TLS extension Apr 10, 2015
@agl agl self-assigned this Apr 12, 2015
@agl

This comment has been minimized.

Copy link
Contributor

@agl agl commented Apr 12, 2015

Yes, this is reasonable and very similar to OCSP stapling that's currently supported.

@titanous

This comment has been minimized.

Copy link
Member Author

@titanous titanous commented Apr 16, 2015

@gopherbot

This comment has been minimized.

Copy link

@gopherbot gopherbot commented Apr 25, 2015

CL https://golang.org/cl/8988 mentions this issue.

@agl agl closed this in 02e69c4 Apr 26, 2015
@mikioh mikioh modified the milestones: Go1.5, Go1.5Maybe May 15, 2015
@golang golang locked and limited conversation to collaborators Jun 25, 2016
FiloSottile pushed a commit to FiloSottile/go that referenced this issue Oct 12, 2018
This change adds support for serving and receiving Signed Certificate
Timestamps as described in RFC 6962.

The server is now capable of serving SCTs listed in the Certificate
structure. The client now asks for SCTs and, if any are received,
they are exposed in the ConnectionState structure.

Fixes golang#10201

Change-Id: Ib3adae98cb4f173bc85cec04d2bdd3aa0fec70bb
Reviewed-on: https://go-review.googlesource.com/8988
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com>
FiloSottile pushed a commit to FiloSottile/go that referenced this issue Oct 12, 2018
This change adds support for serving and receiving Signed Certificate
Timestamps as described in RFC 6962.

The server is now capable of serving SCTs listed in the Certificate
structure. The client now asks for SCTs and, if any are received,
they are exposed in the ConnectionState structure.

Fixes golang#10201

Change-Id: Ib3adae98cb4f173bc85cec04d2bdd3aa0fec70bb
Reviewed-on: https://go-review.googlesource.com/8988
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
Reviewed-by: Jonathan Rudenberg <jonathan@titanous.com>
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
5 participants
You can’t perform that action at this time.