In my capacity as a member of an organisation operating a log, that
reservoir of unlogged certificates is indeed a concern. We do try to fill
our own logs, using certificates found in the wild by the Google search
crawler, for example, but even then, Merkle Town is showing 169M
certificates that could be submitted to Pilot? We have some protection
mechanisms, but it's a worry, with the current log implementations.
Trillian-based logs are faring much better, of course, with even a billion
certificates not being a big deal. :-)
What the logs are allowed to discriminate on is a policy question, of
course, which means it is for others to answer. ;-)
I could imagine a weaker version, where during heavy load, a log might turn
down "final" certificates that have (valid!) SCTs from itself, on the
assumption that they already have some version of it? I'm not sure I would
really go along with that, though, it does seem like it would be best if
both certificates could be logged, in my opinion. We should all be
migrating to Trillian-based logs, basically! ;-)
On Thu, May 17, 2018 at 7:13 PM Jacob Hoffman-Andrews <
js...@letsencrypt.org>
wrote:
> --
> You received this message because you are subscribed to the Google Groups
"Certificate Transparency Policy" group.
> To unsubscribe from this group and stop receiving emails from it, send an
email to
ct-policy+...@chromium.org.
> To post to this group, send email to
ct-p...@chromium.org.
> To view this discussion on the web visit
https://groups.google.com/a/chromium.org/d/msgid/ct-policy/e238e707-49a2-4797-b50b-12b6862ad85f%40chromium.org
.