Hello,
I'm monitoring CT logs to inspect newly issued certificates and I've hit a wall with the undocumented limits on the get-entries endpoint.
RFC 6962 Section 4.6 says "Logs MAY restrict the number of entries that can be retrieved per get-entries request," but doesn't explain how clients should discover what those limits are or how logs should communicate when a limit has been exceeded.
I've measured the following limits across different log operators:
The issues I'm running into:
Silent truncation: When more entries than a log permits are requested, fewer entries are simply returned with no error message, no header, and no way to tell "that's all the entries in this range" from "you hit the limit."
No discovery mechanism: There's no standardized way to query a log for its get-entries limit. Each log operator sets different limits with no documentation.
Rate limiting conflicts: Using a conservative approach (requesting only 32 entries per call to work with all logs) gets me rate limited by DigiCert with 429 errors.
No sustainable workaround: Hardcoding per-log limits doesn't seem viable since new logs are added regularly, operators may change their limits, and there's no authoritative source for this information.
Has anyone else run into this? How are you handling it? Am I missing something obvious?
Thanks,
Michel Le Bihan
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/0f0c4b3c-acd0-49e0-a72d-cea3be18dce8n%40chromium.org.
Hi Alex, Winston and Matt,
Thanks for the quick responses!
I've updated my implementation to always set end to tree_size - 1 and just advance start by the number of entries received in each response. Works perfectly and completely sidesteps the whole issue.
Thanks for taking the time to explain this, and for the code reference. It was really helpful to see a working implementation.
Best,
Michel
--
You received this message because you are subscribed to the Google Groups "Certificate Transparency Policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ct-policy+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/ct-policy/24c96cc6-82be-4906-bfcc-2a8ed907276cn%40chromium.org.