On Tue, Jul 22, 2025 at 05:08:09PM -0700, Hilton De Meillon wrote:
> I'd like to explore running a CT server. I will be upfront and say that
> part of my motivation is curating threat intelligence and external attack
> surface monitoring by accessing the CT log of my own server, so as not to
> put unnecessary and unfair load on public servers.
I may be misunderstanding what you're envisioning, but based on what
you've written I think you might have the wrong impression of what a CT
log (server) does.
In order for the log to have entries, they need to be submitted to the
log. This can be from CAs submitting (pre-)certificates to get enough
SCTs for the certificate to be "valid" in the eyes of CT-validating user
agents, or it can be from someone submitting certificates post-issuance
"just because".
Neither of these approaches is likely to result in your log having
anywhere close to a "full" view of the certificate population at any
given time. As such, using (just) your own log as a source of data for
any purpose is unlikely to produce a useful result. You will still need
to scrape all other logs to ensure you have a complete view.
As for whether get-entries requests can be considered "unnecessary" or
"unfair", I don't see how scraping all the entries in a log could be
considered as such, since the entire point of a CT log is to make
certificates transparently available. As long as you're not repeatedly
hitting the logs for the same entries over and over, your requests are
neither "unnecessary" nor "unfair". Do what all other monitors do --
that is, scrape the log entries into a database and query away, and you
won't be causing anyone any problems.
- Matt