Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/crypto/ocsp: Certificate Transparency, Stapled SCTs #13297

Closed
mehmooda opened this issue Nov 17, 2015 · 3 comments
Closed

x/crypto/ocsp: Certificate Transparency, Stapled SCTs #13297

mehmooda opened this issue Nov 17, 2015 · 3 comments

Comments

@mehmooda
Copy link

@mehmooda mehmooda commented Nov 17, 2015

Support for Stapling SignedCertificateTimestamps would be nice:

To implement:

  • RFC6960 Single Response Extensions EASY. crypto.pkix.Extension
  • RFC6962 Certificate Transparency OCSP MEDIUM
@bradfitz
Copy link
Contributor

@bradfitz bradfitz commented Nov 17, 2015

/cc @agl

@agl
Copy link
Contributor

@agl agl commented Nov 18, 2015

SCTs via the TLS handshake are already supported. At some point it'll make sense to also support validation of SCTs and thus embedded SCTs in certificates and stapled OCSP responses. But I don't think that time is yet as Chrome is still developing this and Go clients aren't the best early use-case for CT.

@agl agl closed this Nov 18, 2015
@mehmooda
Copy link
Author

@mehmooda mehmooda commented Nov 18, 2015

I should have probably created 2 issues. What is required in go is only extension support.

SCTs can be provided by another package at least for now.

All that is required to support extensions is:
https://go-review.googlesource.com/#/c/16946/

@golang golang locked and limited conversation to collaborators Nov 17, 2016
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
4 participants
You can’t perform that action at this time.