Skip to content

Releases: google/certificate-transparency-go

v1.1.8

11 Mar 13:59
59b9bd9
Compare
Choose a tag to compare

What's Changed

  • Recommended Go version for development: 1.21
    • Using a different version can lead to presubmits failing due to unexpected diffs.

Monitoring

  • Distribution metric to monitor the start of get-entries requests by @phbnf in #1364

Add support for AIX

Fixes

Misc

Dependency update

  • Bump golang from 20f9ab5 to 5ee1296 in /trillian/examples/deployment/docker/ctfe by @dependabot in #1216
  • Bump golang from 20f9ab5 to 5ee1296 in /internal/witness/cmd/witness by @dependabot in #1217
  • Bump golang from 20f9ab5 to 5ee1296 in /internal/witness/cmd/feeder by @dependabot in #1218
  • Bump k8s.io/klog/v2 from 2.100.1 to 2.110.1 by @dependabot in #1219
  • Bump golang from 20f9ab5 to 5ee1296 in /integration by @dependabot in #1220
  • Bump golang from 5ee1296 to 5bafbbb in /integration by @dependabot in #1221
  • Bump golang from 5ee1296 to 5bafbbb in /internal/witness/cmd/feeder by @dependabot in #1222
  • Bump golang from 5ee1296 to 5bafbbb in /internal/witness/cmd/witness by @dependabot in #1223
  • Bump golang from 5ee1296 to 5bafbbb in /trillian/examples/deployment/docker/ctfe by @dependabot in #1224
  • Update the minimal image to gcr.io/distroless/base-debian12 by @roger2hk in #1148
  • Bump jq from 1.6 to 1.7 by @roger2hk in #1225
  • Bump github.com/spf13/cobra from 1.7.0 to 1.8.0 by @dependabot in #1226
  • Bump golang.org/x/time from 0.3.0 to 0.4.0 by @dependabot in #1227
  • Bump github.com/mattn/go-sqlite3 from 1.14.17 to 1.14.18 by @dependabot in #1228
  • Bump github.com/gorilla/mux from 1.8.0 to 1.8.1 by @dependabot in #1229
  • Bump golang from 1.21.3-bookworm to 1.21.4-bookworm in /trillian/examples/deployment/docker/ctfe by @dependabot in #1232
  • Bump golang from 1.21.3-bookworm to 1.21.4-bookworm in /internal/witness/cmd/witness by @dependabot in #1233
  • Bump golang from 1.21.3-bookworm to 1.21.4-bookworm in /integration by @dependabot in #1234
  • Bump golang from 1.21.3-bookworm to 1.21.4-bookworm in /internal/witness/cmd/feeder by @dependabot in #1235
  • Bump go-version-input from 1.20.10 to 1.20.11 in govulncheck.yml by @roger2hk in #1238
  • Bump golang.org/x/net from 0.17.0 to 0.18.0 by @dependabot in #1236
  • Bump github/codeql-action from 2.22.5 to 2.22.6 by @dependabot in #1240
  • Bump github/codeql-action from 2.22.6 to 2.22.7 by @dependabot in #1241
  • Bump golang from 85aacbe to dadce81 in /integration by @dependabot in #1243
  • Bump golang from 85aacbe to dadce81 in /internal/witness/cmd/feeder by @dependabot in #1242
  • Bump golang from 85aacbe to dadce81 in /trillian/examples/deployment/docker/ctfe by @dependabot in #1244
  • Bump golang from 85aacbe to dadce81 in /internal/witness/cmd/witness by @dependabot in #1245
  • Bump golang from dadce81 to 52362e2 in /internal/witness/cmd/witness by @dependabot in #1247
  • Bump golang from dadce81 to 52362e2 in /integration by @dependabot in #1248
  • Bump golang from dadce81 to 52362e2 in /trillian/examples/deployment/docker/ctfe by @dependabot in #1249
  • Bump golang from dadce81 to 52362e2 in /internal/witness/cmd/feeder by @dependabot in #1250
  • Bump github/codeql-action from 2.22.7 to 2.22.8 by @dependabot in #1251
  • Bump golang.org/x/net from 0.18.0 to 0.19.0 by @dependabot in #1252
  • Bump golang.org/x/time from 0.4.0 to 0.5.0 by @dependabot in #1254
  • Bump alpine from eece025 to 34871e7 in /internal/witness/cmd/feeder by @dependabot in #1256
  • Bump alpine from eece025 to 34871e7 in /trillian/examples/deployment/docker/envsubst by @dependabot in #1257
  • Bump go-version-input from 1.20.11 to 1.20.12 in govulncheck.yml by @roger2hk in #1264
  • Bump actions/setup-go from 4.1.0 to 5.0.0 by @dependabot in #1261
  • Bump golang from 1.21.4-bookworm to 1.21.5-bookworm in /internal/witness/cmd/witness by @dependabot in #1259
  • Bump golang from 1.21.4-bookworm to 1.21.5-bookworm in /integration by @dependabot in #1263
  • Bump golang from 1.21.4-bookworm to 1.21.5-bookworm in /internal/witness/cmd/feeder by @dependabot in #1262
  • Bump golang from 1.21.4-bookworm to 1.21.5-bookworm in /trillian/examples/deployment/docker/ctfe by @dependabot in #1260
  • Bump go.etcd.io/etcd/v3 from 3.5.10 to 3.5.11 by @dependabot in #1266
  • Bump github/codeql-action from 2.22.8 to 2.22.9 by @dependabot in #1269
  • Bump alpine from 34871e7 to 51b6726 in /internal/witness/cmd/feeder by @dependabot in #1270
  • Bump alpine from 3.18 to 3.19 in /trillian/examples/deployment/docker/envsubst by @dependabot in #1271
  • Bump golang from a6b787c to 2d3b13c in /internal/witness/cmd/feeder by @dependabot in #1272
  • Bump golang from a6b787c to 2d3b13c in /internal/witness/cmd/witness by @dependabot in #1273
  • Bump golang from a6b787c to 2d3b13c in /integration by @dependabot in #1274
  • Bump golang from a6b787c to 2d3b13c in /trillian/examples/deployment/docker/ctfe by @dependabot in #1275
  • Bump github/codeql-action from 2.22.9 to 2.22.10 by @dependabot in #1278
  • Bump google.golang.org/grpc from 1.59.0 to 1.60.0 by @dependabot in #1279
  • Bump github/codeql-action from 2.22.10 to 3.22.11 by @dependabot in #1280
  • Bump distroless/base-debian12 from 1dfdb5e to 8a0bb63 in /trillian/examples/deployment/docker/ctfe by @dependabot in #1281
  • Bump github.com/google/trillian from 1.5.3 to 1.5.4-0.20240110091238-00ca9abe023d by @mhutchinson in #1297
  • Bump actions/upload-artifact from 3.1.3 to 4.0.0 by @dependabot in #1282
  • Bump github/codeql-action from 3.22.11 to 3.23.0 by @dependabot in #1295
  • Bump github.com/mattn/go-sqlite3 from 1.14.18 to 1.14.19 by @dependabot in #1283
  • Bump golang from 1.21.5-bookworm to 1.21.6-bookworm in /integration by @dependabot in #1300
  • Bump d...
Read more

v1.1.7

01 Nov 18:26
42c8cff
Compare
Choose a tag to compare

What's Changed

  • Recommended Go version for development: 1.20

    • This is the version used by the Cloud Build presubmits. Using a different version can lead to presubmits failing due to unexpected diffs.
  • Bump golangci-lint from 1.51.1 to 1.55.1 (developers should update to this version).

Add support for WASI port

Add support for IBM Z operating system z/OS

Log List

  • Add support for "is_all_logs" field in loglist3 by @phbnf in #1095

Documentation

  • Improve Dockerized Test Deployment documentation by @roger2hk in #1179

Misc

Dependency update

Read more

v1.1.6

11 May 08:02
55b99fc
Compare
Choose a tag to compare

What's Changed

Deployments

Repo config

Dependency update

Misc

  • Update CHANGELOG.md for v1.1.5 release by @phbnf in #1063

Full Changelog: v1.1.5...v1.1.6

v1.1.5

26 Apr 13:16
f19baea
Compare
Choose a tag to compare

Key management

  • If a public key has been configured for a log, check that it is consistent with the private key by @robstradling in #1044
  • Don't allow the same private key to be used by more than one configured log by @robstradling in #1046

Log list

Vulnerability management

Fixes

Cleanups

Dependency updates

New Contributors

Full Changelog: v1.1.4...v1.1.5

v1.1.4

21 Oct 16:09
50ef850
Compare
Choose a tag to compare

Log list

Logging

Cleanup

Misc

  • Add test leaf template with serverAuth EKU by @pavelkalinnikov in #893
  • Fix S1039: unnecessary use of fmt.Sprintf in presubmit lint messages by @roger2hk in #932
  • Update Go version and remove log list v1, v2 in README.md by @roger2hk in #979
  • Add missing license header by @AlCutter in #970
  • Downgrade 429 errors to verbosity 2 (#957) by @mhutchinson in #963
  • Update to testdata.SampleLogList3 in distributor_test.go by @roger2hk in #966
  • Update linter, fix errors, delete travis config by @mhutchinson in #940
  • Add CODEOWNERS with default team assignment by @AlCutter in #939

Dependency updates

Full Changelog: v1.1.3...v1.1.4

v1.1.3

13 May 16:11
5162ff6
Compare
Choose a tag to compare

New features

  • #867: Add package for (un)marshalling the loglist3 schema
  • #927: Add readonly logs mode to CTFE configuration
  • Add experimental (not exported from the Go module) implementation of CT witness. Running witnesses by multiple independent organisations allows detecting and preventing split-view attacks.

Improvements / bug fixes

  • #852: migrillian: Return error if context was canceled
  • #896: jsonclient: retry POSTs after getting HTTP 429
  • #901: ctclient: Use Cobra library for command-line tools
  • #920: Set is_master metric to 0 for when starting up
  • #928: Do not print context canceled errors

Slightly breaking changes

  • #881: Terminate hammer early if the context is cancelled
  • #903, #921: Move PEMCertPool from CTFE package to x509util

Dependency updates

  • Switch Merkle tree code to use github.com/transparency-dev/merkle@v0.0.1 [#874, ..., #924]
  • Trillian: v1.4.0 -> v1.4.1 [#924]
  • Replace juju/ratelimit with x/time/rate [#800]
  • protoc: v3.12.4 -> v3.20.1 [#923]
  • github.com/fullstorydev/grpcurl: 1.8.2->1.8.6 [#860, #891]
  • github.com/google/go-cmp: 0.5.6->0.5.8 [#879, #917]
  • github.com/mattn/go-sqlite3: 1.14.8->1.14.10 [#873]
  • github.com/rs/cors: 1.8.0->1.8.2 [#872]
  • go.etcd.io/etcd/v3: 3.5.0->3.5.4 [#859, #887, #913]
  • google.golang.org/grpc: v1.40.0 -> v1.46.0 [#914]

Full Changelog: v1.1.2...v1.1.3

v1.1.2

21 Sep 14:31
Compare
Choose a tag to compare

CTFE

  • Removed the -by_range flag.

Updated dependencies

  • Trillian from v1.3.11 to v1.4.0
  • protobuf to v2

v1.1.1

06 Oct 15:53
Compare
Choose a tag to compare

Tools

CT Hammer

Added a flag (--strict_sth_consistency_size) which when set to true enforces the current behaviour of only request consistency proofs between tree sizes for which the hammer has seen valid STHs.
When setting this flag to false, if no two usable STHs are available the hammer will attempt to request a consistency proof between the latest STH it's seen and a random smaller (but > 0) tree size.

CTFE

Caching

The CTFE now includes a Cache-Control header in responses containing purely
immutable data, e.g. those for get-entries and get-proof-by-hash. This allows
clients and proxies to cache these responses for up to 24 hours.

EKU Filtering

⚠️ It is not yet recommended to enable this option in a production CT Log!

CTFE now supports filtering logging submissions by leaf certificate EKU.
This is enabled by adding an extKeyUsage list to a log's stanza in the
config file.

The format is a list of strings corresponding to the supported golang x509 EKUs:

Config string Extended Key Usage
Any ExtKeyUsageAny
ServerAuth ExtKeyUsageServerAuth
ClientAuth ExtKeyUsageClientAuth
CodeSigning ExtKeyUsageCodeSigning
EmailProtection ExtKeyUsageEmailProtection
IPSECEndSystem ExtKeyUsageIPSECEndSystem
IPSECTunnel ExtKeyUsageIPSECTunnel
IPSECUser ExtKeyUsageIPSECUser
TimeStamping ExtKeyUsageTimeStamping
OCSPSigning ExtKeyUsageOCSPSigning
MicrosoftServerGatedCrypto ExtKeyUsageMicrosoftServerGatedCrypto
NetscapeServerGatedCrypto ExtKeyUsageNetscapeServerGatedCrypto

When an extKeyUsage list is specified, the CT Log will reject logging
submissions for leaf certificates that do not contain an EKU present in this
list.

When enabled, EKU filtering is only performed at the leaf level (i.e. there is
no 'nested' EKU filtering performed).

If no list is specified, or the list contains an Any entry, no EKU
filtering will be performed.

GetEntries

Calls to get-entries which are at (or above) the maximum permitted number of
entries whose start parameter does not fall on a multiple of the maximum
permitted number of entries, will have their responses truncated such that
subsequent requests will align with this boundary.
This is intended to coerce callers of get-entries into all using the same
start and end parameters and thereby increase the cachability of
these requests.

e.g.:

Old behaviour:
             1         2         3
             0         0         0
Entries>-----|---------|---------|----...
Client A -------|---------|----------|...
Client B --|--------|---------|-------...
           ^        ^         ^
           `--------`---------`---- requests

With coercion (max batch = 10 entries):
             1         2         3
             0         0         0
Entries>-----|---------|---------|----...
Client A ----X---------|---------|...
Client B --|-X---------|---------|-------...
             ^
             `-- Requests truncated

This behaviour can be disabled by setting the --align_getentries
flag to false.

Flags

The ct_server binary changed the default of these flags:

  • by_range - Now defaults to true

The ct_server binary added the following flags:

  • align_getentries - See GetEntries section above for details

Added backend flag to migrillian, which now replaces the deprecated
"backend" feature of Migrillian configs.

FixedBackendResolver Replaced

This was previously used in situations where a comma separated list of
backends was provided in the rpcBackend flag rather than a single value.

It has been replaced by equivalent functionality using a newer gRPC API.
However this support was only intended for use in integration tests. In
production we recommend the use of etcd or a gRPC load balancer.

LogList

Log list tools updated to use the correct v2 URL (from v2_beta previously).

Libraries

x509 fork

Merged upstream Go 1.13 and Go 1.14 changes (with the exception
of golang/go@14521198679e, to allow
old certs using a malformed root still to be logged).

asn1 fork

Merged upstream Go 1.14 changes.

ctutil

Added VerifySCTWithVerifier() to verify SCTs using a given ct.SignatureVerifier.

Configuration Files

Configuration files that previously had to be text-encoded Protobuf messages can
now alternatively be binary-encoded instead.

JSONClient

  • PostAndParseWithRetry error logging now includes log URI in messages.

Minimal Gossip Example

All the code for this, except for the x509ext package, has been moved over
to the trillian-examples repository.

This keeps the code together and removes a circular dependency between the
two repositories. The package layout and structure remains the same so
updating should just mean changing any relevant import paths.

Dependencies

A circular dependency on the monologue repository has been removed.

A circular dependency on the trillian-examples repository has been removed.

The version of trillian in use has been updated to 1.3.11. This has required
various other dependency updates including gRPC and protobuf. This code now
uses the v2 proto API. The Travis tests now expect the 3.11.4 version of
protoc.

The version of etcd in use has been switched to the one from go.etcd.io.

Most of the above changes are to align versions more closely with the ones
used in the trillian repository.

v1.1.0

14 Nov 15:22
Compare
Choose a tag to compare

CTFE

The reject_expired and reject_unexpired configuration fields for the CTFE have been changed so that their behaviour reflects their name:

  • reject_expired only rejects expired certificates (i.e. it now allows not-yet-valid certificates).
  • reject_unexpired only allows expired certificates (i.e. it now rejects not-yet-valid certificates).

A reject_extensions configuration field for the CTFE was added, this allows submissions to be rejected if they contain an extension with any of the specified OIDs.

A frozen_sth configuration field for the CTFE was added. This STH will be served permanently. It must be signed by the log's private key.

A /healthz URL has been added which responds with HTTP 200 OK and the string "ok" when the server is up.

Flags

The ct_server binary has these new flags:

  • mask_internal_errors - Removes error strings from HTTP 500 responses (Internal Server Error)

Removed default values for --metrics_endpoint and --log_rpc_server flags. This makes it easier to get the documented "unset" behaviour.

Metrics

The CTFE exports these new metrics:

  • is_mirror - set to 1 for mirror logs (copies of logs hosted elsewhere)
  • frozen_sth_timestamp - time of the frozen Signed Tree Head in milliseconds since the epoch

Kubernetes

Updated prometheus-to-sd to v0.5.2.

A dedicated node pool is no longer required by the Kubernetes manifests.

Log Lists

A new package has been created for parsing, searching and creating JSON log lists compatible with the v2 schema: github.com/google/certificate-transparency-go/loglist2.

Docker Images

Our Docker images have been updated to use Go 1.11 and Distroless base images.

The CTFE Docker image now sets ENTRYPOINT.

Utilities / Libraries

jsonclient

The jsonclient package now copes with empty HTTP responses. The user-agent header it sends can now be specified.

x509 and asn1 forks

Merged upstream changes from Go 1.12 into the asn1 and x509 packages.

Added a "lax" tag to asn1 that applies recursively and makes some checks more relaxed:

  • parsePrintableString() copes with invalid PrintableString contents, e.g. use of tagPrintableString when the string data is really ISO8859-1.
  • checkInteger() allows integers that are not minimally encoded (and so are not correct DER).
  • OIDs are allowed to be empty.

The following x509 functions will now return x509.NonFatalErrors if ASN.1 parsing fails in strict mode but succeeds in lax mode. Previously, they only attempted strict mode parsing.

  • x509.ParseTBSCertificate()
  • x509.ParseCertificate()
  • x509.ParseCertificates()

The x509 package will now treat a negative RSA modulus as a non-fatal error.

The x509 package now supports RSASES-OAEP and Ed25519 keys.

ctclient

The ctclient tool now defaults to using all_logs_list.json instead of log_list.json. This can be overridden using the --log_list flag.

It can now perform inclusion checks on pre-certificates.

It has these new commands:

  • bisect - Finds a log entry given a timestamp.

It has these new flags:

  • --chain - Displays the entire certificate chain
  • --dns_server - The DNS server to direct queries to (system resolver by default)
  • --skip_https_verify - Skips verification of the HTTPS connection
  • --timestamp - Timestamp to use for bisect and inclusion commands (for inclusion, only if --leaf_hash is not used)

It now accepts hex or base64-encoded strings for the --tree_hash, --prev_hash and --leaf_hash flags.

certcheck

The certcheck tool has these new flags:

  • --check_time - Check current validity of certificate (replaces --timecheck)
  • --check_name - Check validity of certificate name
  • --check_eku - Check validity of EKU nesting
  • --check_path_len - Check validity of path length constraint
  • --check_name_constraint - Check name constraints
  • --check_unknown_critical_exts - Check for unknown critical extensions (replaces --ignore_unknown_critical_exts)
  • --strict - Set non-zero exit code for non-fatal errors in parsing

sctcheck

The sctcheck tool has these new flags:

  • --check_inclusion - Checks that the SCT was honoured (i.e. the corresponding certificate was included in the issuing CT log)

ct_hammer

The ct_hammer tool has these new flags:

  • --duplicate_chance - Allows setting the probability of the hammer sending a duplicate submission.

CTFE Logging / Path Options. Mirroring. RPKI. Non Fatal X.509 error improvements

20 Aug 10:11
3629d68
Compare
Choose a tag to compare

CTFE

CTFE no longer prints certificate chains as long byte strings in messages when handler errors occur. This was obscuring the reason for the failure and wasn't particularly useful.

CTFE now has a global log URL path prefix flag and a configuration proto for a log specific path. The latter should help for various migration strategies if existing C++ server logs are going to be converted to run on the new code.

Mirroring

More progress has been made on log mirroring. We believe that it's now at the point where testing can begin.

Utilities / Libraries

The certcheck and ct_hammer utilities have received more enhancements.

x509 and x509util now support Subject Information Access and additional extensions for RPKI / RFC 3779.

scanner / fixchain and some other command line utilities now have better handling of non-fatal errors.