Searching Certificate Transparency Logs (Part 2)
In this post we’ll write Golang code to pull Certificate Transparency Log entries and process them at scale.
Eric Brandes is a longtime software engineer and founder who, despite his best efforts, has become well versed in the arcane world of Web PKI. For years he was perfectly content writing fast, scalable applications. Pausing every few years to perform the mandatory TLS certificate renewal ritual. But as certificate lifetimes kept shrinking and automation became unavoidable, he went down the PKI rabbit hole.
Now he’s building CertKit to make certificate management simple, reliable, and actually kind of pleasant. And he’s building it for application developers who have better things to do than worry about TLS certificate minutiae.
He writes about the footguns, pitfalls and gotchas associated with Web PKI and certificate lifecycle management. Focusing on real world usage and actual code examples.
In this post we’ll write Golang code to pull Certificate Transparency Log entries and process them at scale.
Searching Certificate Transparency logs lets you uncover every SSL/TLS certificate ever issued for your domain. You can detect mis-issuance, unauthorized changes, or shadow infrastructure before it becomes a problem. It’s a good way to monitor your digital identity and maintain trust in your organization’s security posture.