| ▲ | tialaramex 5 hours ago | ||||||||||||||||
What you're monitoring is "Did my system request a renewed cert?" but what most people's customers care about is instead, "Did our HTTPS endpoint use an in-date certificate?" For example say you've got an internal test endpoint, two US endpoints and a rest-of-world endpoint, physically located in four places. Maybe your renewal process works with a month left - but the code to replace working certificates in a running instance is bugged. So, maybe Monday that renewal happens, your "CT log monitor" approach is green, but nobody gets new certs. On Wednesday engineers ship a new test release to the test endpoint, restarting and thus grabbing the renewed cert, for them everything seems great. Then on Friday afternoon a weird glitch happens for some US customers, restarting both US servers seems to fix the glitch and now US customers also see a renewed cert. But a month later the Asian customers complain everything is broken - because their endpoint is still using the old certificate. | |||||||||||||||||
| ▲ | xorcist 3 hours ago | parent | next [-] | ||||||||||||||||
> Did our HTTPS endpoint use an in-date certificate? For any non-trivial organization, you want to know when client certificates expire too. In my experience, the easiest way is to export anything that remotely looks like a certificate to the monitoring system, and let people exclude the false positives. Of course, that requires you to have a monitoring system in the first place. That is no longer a given. | |||||||||||||||||
| |||||||||||||||||
| ▲ | machinationu an hour ago | parent | prev [-] | ||||||||||||||||
sure, I was just giving parent another way of finding all the certificates besides scanning the network | |||||||||||||||||