Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #33602

Closed (moved)
(moved)
Open
Created Mar 12, 2020 by anarcat@anarcat

monitor certificate transparency log

we should use something like SSLMate.com or certspotter to monitor certificates issued in our place.

https://github.com/SSLMate/certspotter

this could be ran on nevii, nagios or pauli. it's unclear what we should do with the output, there will be possibly be lots of false positive, as the certificates will appear in our logs every time one of our cert is (legitimitely) renewed.

it's a debian package since buster. i ran a test locally, and it's basically:

sed 's/ /\n/g;/^#/d;/^ *$/d' letsencryt-domains/domains  | sort | certspotter -watchlist -

the key trick however, is to not warn when a new cert is renewed. therefore we would need to be somewhat clever and recognize our own certificates in there and filter those out.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking