If *you* want to log TLS alert responses, you could do so by using your custom configured tls listener that reports TLS alerts received by the client and provide that to a net/http server :-).
I think the net/http package should not report TLS alerts by the client by default. I would assume that net/http logs errors that are probably related to server side bugs/errors/malfunctions or connection errors. A message received by the client that *HE* decided to not trust your certificate should not be assumed to be such an error, because the decision is completely up to the client. Therefore, the fact that the client sends back such a response doesn"t seem to be a good indicator for an "error"?
However, I see that the attack surface would be VERY small and you would have to do MANY requests to trouble the server. :-)
I was just curious, whether anybody else thinks, that net/http's / net/http2's default behaviour to log those TLS-alerts could be "wrong" or problematic. :-)