| ▲ | machinationu 7 hours ago | |||||||||||||||||||||||||||||||
relevant certificates could be located by scanning the certificate transparency logs | ||||||||||||||||||||||||||||||||
| ▲ | firesteelrain 20 minutes ago | parent | next [-] | |||||||||||||||||||||||||||||||
I am airgapped and the certs are usually wildcard with multiple SANs. You would think that the SANs alone would tell you which host has a cert. But, it can be difficult to find all the hosts or even internal hosts that use TLS. | ||||||||||||||||||||||||||||||||
| ▲ | tialaramex 5 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||
What you're monitoring is "Did my system request a renewed cert?" but what most people's customers care about is instead, "Did our HTTPS endpoint use an in-date certificate?" For example say you've got an internal test endpoint, two US endpoints and a rest-of-world endpoint, physically located in four places. Maybe your renewal process works with a month left - but the code to replace working certificates in a running instance is bugged. So, maybe Monday that renewal happens, your "CT log monitor" approach is green, but nobody gets new certs. On Wednesday engineers ship a new test release to the test endpoint, restarting and thus grabbing the renewed cert, for them everything seems great. Then on Friday afternoon a weird glitch happens for some US customers, restarting both US servers seems to fix the glitch and now US customers also see a renewed cert. But a month later the Asian customers complain everything is broken - because their endpoint is still using the old certificate. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||