Part 3 · PKI Architecture 8 min read

Certificate Transparency

Certificate Transparency is an open framework of logs, monitors, and auditors that makes it nearly impossible for a certificate authority to issue a certificate without the domain owner knowing about it. It is one of the most important accountability mechanisms in modern PKI.

Quick Facts

Type
Educational
Level
Intermediate
Topics
7 sections
Chapter
14 of 25
Next
Certificate Lifecycle Overview

Introduction

In 2011, a Dutch Certificate Authority called DigiNotar was compromised. Attackers issued fraudulent certificates for major domains, including *.google.com, and used them to intercept the communications of hundreds of thousands of people. The breach went undetected for weeks because there was no public, auditable record of which certificates had been issued, or by whom.

The DigiNotar incident (along with similar events involving Comodo and other CAs) exposed a fundamental weakness in the PKI ecosystem: the trust model assumed that every CA would behave correctly at all times, but offered no mechanism to verify that assumption. Domain owners had no practical way to know whether a rogue or compromised CA had issued a certificate for their domain.

Certificate Transparency (CT) was created by Google engineers Ben Laurie and Adam Langley to solve this problem. Defined in RFC 6962 (and later updated by RFC 9162), CT introduces a system of publicly auditable, append-only logs that record every certificate a participating CA issues. The idea is simple but powerful: if every certificate must be logged before it is trusted, then fraudulent or mistaken issuance becomes visible to anyone who cares to look.

How CT Works

Certificate Transparency relies on three types of participants working together. Each plays a distinct role in ensuring that certificate issuance remains open and verifiable.

1

Log Servers

When a CA issues a certificate, it submits that certificate (or a precertificate) to one or more CT log servers. These logs are append-only, meaning entries can be added but never modified or deleted. The log server returns a Signed Certificate Timestamp (SCT), which is a cryptographic promise that the certificate will appear in the log within a defined time window (the Maximum Merge Delay, typically 24 hours).

2

Monitors

Monitors are services that watch CT logs for new entries. Domain owners (or security teams acting on their behalf) use monitors to detect certificates issued for their domains. If a certificate appears that the domain owner did not request, it is a strong signal of either CA compromise or mis-issuance. Services like Google's Certificate Transparency search, crt.sh, and commercial CLM platforms all act as monitors.

3

Auditors

Auditors verify the integrity of the logs themselves. They check that logs are behaving correctly: that entries are not being removed, that the Merkle tree structure is consistent, and that SCTs correspond to actual log entries. Browsers can act as auditors by verifying that presented SCTs match log records.

Together, these three roles create a system of mutual accountability. CAs cannot secretly issue certificates because the logs are public. Logs cannot silently tamper with records because auditors verify their consistency. And domain owners can spot unauthorized issuance because monitors watch the logs continuously.

CT Log Structure

CT logs use a cryptographic data structure called a Merkle hash tree to guarantee tamper evidence. Understanding the basics of this structure helps explain why CT logs are so difficult to manipulate.

Leaf Nodes

Each certificate entry in the log becomes a leaf node. The certificate data is hashed to produce a unique fingerprint. This means that every certificate in the log has a fixed, verifiable position.

Parent Hashes

Pairs of leaf hashes are combined and hashed again to produce parent nodes. This process repeats up the tree until a single root hash is produced. If any leaf changes, the root hash changes too, making tampering immediately detectable.

Consistency Proofs

Anyone can ask a log server to prove that a previous version of the tree is a subset of the current version. This is how auditors verify that entries were never removed or altered between two points in time.

Inclusion Proofs

Given a specific certificate, the log server can produce a compact proof (a small set of hashes) that demonstrates the certificate is part of the tree. This allows efficient verification without downloading the entire log.

The elegance of Merkle trees is that they make it computationally infeasible to alter a log without detection. Even a single changed byte in any certificate would produce a different root hash, and any auditor comparing snapshots of the tree would immediately notice the discrepancy.

Who Benefits from CT

Certificate Transparency delivers value to multiple participants in the PKI ecosystem. Here is how each group benefits:

Domain Owners

Domain owners can monitor CT logs to detect certificates issued for their domains that they did not authorize. This is critical for catching phishing sites, CA compromise, or internal mis-issuance before damage is done. Organizations that monitor for shadow certificates often rely on CT data as a primary source.

Browsers and End Users

Browsers enforce CT requirements so that users are protected even if they never interact with CT directly. By requiring valid SCTs before trusting a TLS certificate, browsers ensure that every certificate has been publicly logged and is therefore subject to scrutiny.

Certificate Authorities

While CT creates accountability for CAs, it also benefits them. A CA that logs all its certificates demonstrates good practice and builds trust with browser vendors. CT also helps CAs detect if their infrastructure has been compromised, since unauthorized issuance would appear in the public logs.

CT Requirements by Browsers

Browser vendors have been the primary driving force behind CT adoption. Each major browser has its own policy regarding how many SCTs a certificate must carry and which logs are considered trusted.

Google Chrome

Chrome was the first browser to require CT and has the strictest policy. Since April 2018, all newly issued publicly trusted certificates must be accompanied by SCTs from at least two independent CT logs. Certificates without valid SCTs are treated as untrusted and trigger a full-page warning.

Apple Safari

Apple requires CT compliance for all TLS certificates issued after October 15, 2018. Safari requires SCTs from at least two logs, and one of those logs must have been in a "qualified" state at the time the certificate was issued. Apple maintains its own list of trusted CT logs.

Mozilla Firefox

Firefox has historically not enforced CT requirements at the browser level, relying instead on CAs complying voluntarily. However, Mozilla has signaled increasing interest in CT enforcement through its root program policies, and practical enforcement is expected to follow Chrome and Apple's lead.

SCT Delivery Methods

SCTs can be delivered to browsers in three ways: embedded directly in the certificate (the most common approach), via a TLS extension during the handshake, or through OCSP stapling. Each method has trade-offs in terms of deployment complexity and server configuration.

Limitations of CT

Certificate Transparency is a significant improvement to the PKI ecosystem, but it is not a complete solution on its own. Understanding its limitations is important for setting realistic expectations.

Detection, Not Prevention

CT makes mis-issuance visible, but it does not prevent it from happening. A compromised CA can still issue a fraudulent certificate. The value of CT lies in ensuring that the fraud is discovered quickly, not in blocking it at the source. Remediation still depends on revocation mechanisms and browser enforcement.

Private Certificates Are Not Logged

CT applies only to publicly trusted certificates. Internal certificates issued by private CAs are not logged, which means CT provides no visibility into an organization's internal PKI. For organizations with large private certificate estates, separate discovery and monitoring tools are essential.

Log Operator Reliability

CT depends on log operators running stable, available infrastructure. If a log server goes down or misbehaves, certificates that rely on SCTs from that log may face trust issues. Browser vendors maintain lists of approved logs and will remove operators that fail to meet uptime or consistency standards.

Privacy Concerns

Because CT logs are public, they reveal the existence of every domain and subdomain for which a public certificate was issued. This can expose internal infrastructure naming conventions, staging environments, or acquisition targets. Organizations that value domain privacy should consider wildcard certificates or be deliberate about what subdomains they certify publicly.

How we help

Evertrust & Certificate Transparency

CT log monitoring: Evertrust CLM ingests data from Certificate Transparency logs to detect certificates issued for your domains, whether you requested them or not. This gives you immediate visibility into unauthorized or unexpected issuance.

Complete inventory: CT data is combined with network scanning and connector-based discovery to build a unified inventory that covers both public and private certificates. No blind spots, no shadow certificates hiding outside your field of view.

Alerting on anomalies: When a certificate appears in CT logs for one of your domains that does not match your known inventory, Evertrust raises an alert so your security team can investigate and respond before any damage occurs.

Policy enforcement: Evertrust helps you define and enforce policies that ensure all public certificates are CT-compliant, reducing the risk of browser trust failures across your infrastructure.