20f9ab5
to 5ee1296
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/121620f9ab5
to 5ee1296
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/121720f9ab5
to 5ee1296
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/121820f9ab5
to 5ee1296
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/12205ee1296
to 5bafbbb
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/12215ee1296
to 5bafbbb
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/12225ee1296
to 5bafbbb
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/12235ee1296
to 5bafbbb
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/122485aacbe
to dadce81
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/124385aacbe
to dadce81
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/124285aacbe
to dadce81
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/124485aacbe
to dadce81
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1245dadce81
to 52362e2
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1247dadce81
to 52362e2
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1248dadce81
to 52362e2
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1249dadce81
to 52362e2
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1250eece025
to 34871e7
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1256eece025
to 34871e7
in /trillian/examples/deployment/docker/envsubst by @dependabot in https://github.com/google/certificate-transparency-go/pull/125734871e7
to 51b6726
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1270a6b787c
to 2d3b13c
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1272a6b787c
to 2d3b13c
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1273a6b787c
to 2d3b13c
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1274a6b787c
to 2d3b13c
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/12751dfdb5e
to 8a0bb63
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/12818a0bb63
to 0a93daa
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1284688ad7f
to 1e8ea75
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1306688ad7f
to 1e8ea75
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/13051e8ea75
to cbee5d2
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1312688ad7f
to cbee5d2
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/13081e8ea75
to cbee5d2
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1311b651ed8
to cbee5d2
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1309cbee5d2
to c4b696f
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1314cbee5d2
to c4b696f
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1315cbee5d2
to c4b696f
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1316cbee5d2
to c4b696f
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1318c4b696f
to d8c365d
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1326c4b696f
to d8c365d
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1323c4b696f
to d8c365d
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1322c4b696f
to d8c365d
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/132551b6726
to c5b1261
in /trillian/examples/deployment/docker/envsubst by @dependabot in https://github.com/google/certificate-transparency-go/pull/133051b6726
to c5b1261
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1329d8c365d
to 69bfed3
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1335d8c365d
to 69bfed3
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1338d8c365d
to 69bfed3
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1337d8c365d
to 69bfed3
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/133669bfed3
to 3efef61
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/133969bfed3
to 3efef61
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/134169bfed3
to 3efef61
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/13430a93daa
to f47fa3d
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/134069bfed3
to 3efef61
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1342f47fa3d
to 2102ce1
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1355874c267
to 5a3e169
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1356874c267
to 5a3e169
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1358874c267
to 5a3e169
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1359874c267
to 5a3e169
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/13605a3e169
to 925fe3f
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/13635a3e169
to 925fe3f
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/13655a3e169
to 925fe3f
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/13615a3e169
to 925fe3f
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/13672102ce1
to 5eae9ef
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/13725eae9ef
to f9b0e86
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1375f9b0e86
to 5eae9ef
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1376Recommended Go version for development: 1.20
Bump golangci-lint from 1.51.1 to 1.55.1 (developers should update to this version).
fd9306e
to eb3f9ac
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1127fd9306e
to eb3f9ac
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/112882d1e9d
to 7144f7b
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1130fd9306e
to eb3f9ac
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/113173deaaf
to 46c5b9b
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1136445f340
to 96634e5
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1142d3114db
to a0b3bc4
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1155d3114db
to a0b3bc4
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1157d3114db
to a0b3bc4
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1156d3114db
to a0b3bc4
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1158e06b3a4
to 114b9cc
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1159a0b3bc4
to 114b9cc
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1160a0b3bc4
to 114b9cc
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/1161114b9cc
to 9c7ea4a
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1163114b9cc
to 9c7ea4a
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1166114b9cc
to 9c7ea4a
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1165114b9cc
to 9c7ea4a
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/11649c7ea4a
to 61f84bc
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/11689c7ea4a
to 61f84bc
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/11707144f7b
to eece025
in /trillian/examples/deployment/docker/envsubst by @dependabot in https://github.com/google/certificate-transparency-go/pull/11747144f7b
to eece025
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/11759c7ea4a
to 61f84bc
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/11719c7ea4a
to 61f84bc
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/117346c5b9b
to a35b652
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1177a35b652
to b31a6e0
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/1188a94b089
to 8f9a1ec
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1196a94b089
to 5cc7ddc
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1200a94b089
to 5cc7ddc
in /internal/witness/cmd/witness by @dependabot in https://github.com/google/certificate-transparency-go/pull/11995cc7ddc
to 20f9ab5
in /integration by @dependabot in https://github.com/google/certificate-transparency-go/pull/1203a94b089
to 20f9ab5
in /trillian/examples/deployment/docker/ctfe by @dependabot in https://github.com/google/certificate-transparency-go/pull/11988f9a1ec
to 20f9ab5
in /internal/witness/cmd/feeder by @dependabot in https://github.com/google/certificate-transparency-go/pull/1201integration.HammerCTLog
:
ctx
as first argument, and terminate loop if it becomes cancelledWithBalancerName
is deprecated and removed, using the recommended way.ctfe.PEMCertPool
type has been moved to x509util.PEMCertPool
to reduce
dependencies (#903).google.golang.org/grpc
to v1.46.0ctclient
tool now uses Cobra for better CLI experience (#901).ratelimit
.-by_range
flag.Added a flag (--strict_sth_consistency_size) which when set to true enforces the current behaviour of only request consistency proofs between tree sizes for which the hammer has seen valid STHs. When setting this flag to false, if no two usable STHs are available the hammer will attempt to request a consistency proof between the latest STH it's seen and a random smaller (but > 0) tree size.
The CTFE now includes a Cache-Control header in responses containing purely immutable data, e.g. those for get-entries and get-proof-by-hash. This allows clients and proxies to cache these responses for up to 24 hours.
:warning: It is not yet recommended to enable this option in a production CT Log!
CTFE now supports filtering logging submissions by leaf certificate EKU. This is enabled by adding an extKeyUsage list to a log's stanza in the config file.
The format is a list of strings corresponding to the supported golang x509 EKUs:
|Config string | Extended Key Usage |
|----------------------------|----------------------------------------|
|Any
| ExtKeyUsageAny |
|ServerAuth
| ExtKeyUsageServerAuth |
|ClientAuth
| ExtKeyUsageClientAuth |
|CodeSigning
| ExtKeyUsageCodeSigning |
|EmailProtection
| ExtKeyUsageEmailProtection |
|IPSECEndSystem
| ExtKeyUsageIPSECEndSystem |
|IPSECTunnel
| ExtKeyUsageIPSECTunnel |
|IPSECUser
| ExtKeyUsageIPSECUser |
|TimeStamping
| ExtKeyUsageTimeStamping |
|OCSPSigning
| ExtKeyUsageOCSPSigning |
|MicrosoftServerGatedCrypto
| ExtKeyUsageMicrosoftServerGatedCrypto |
|NetscapeServerGatedCrypto
| ExtKeyUsageNetscapeServerGatedCrypto |
When an extKeyUsage list is specified, the CT Log will reject logging submissions for leaf certificates that do not contain an EKU present in this list.
When enabled, EKU filtering is only performed at the leaf level (i.e. there is no 'nested' EKU filtering performed).
If no list is specified, or the list contains an Any
entry, no EKU
filtering will be performed.
Calls to get-entries
which are at (or above) the maximum permitted number of
entries whose start
parameter does not fall on a multiple of the maximum
permitted number of entries, will have their responses truncated such that
subsequent requests will align with this boundary.
This is intended to coerce callers of get-entries
into all using the same
start
and end
parameters and thereby increase the cacheability of
these requests.
e.g.:
Old behaviour: 1 2 3 0 0 0 Entries>-----|---------|---------|----... Client A -------|---------|----------|... Client B --|--------|---------|-------... ^ ^ ^ `--------`---------`---- requests With coercion (max batch = 10 entries): 1 2 3 0 0 0 Entries>-----|---------|---------|----... Client A ----X---------|---------|... Client B --|-X---------|---------|-------... ^ `-- Requests truncated
This behaviour can be disabled by setting the --align_getentries
flag to false.
The ct_server
binary changed the default of these flags:
by_range
- Now defaults to true
The ct_server
binary added the following flags:
align_getentries
- See GetEntries section above for detailsAdded backend
flag to migrillian
, which now replaces the deprecated
"backend" feature of Migrillian configs.
This was previously used in situations where a comma separated list of
backends was provided in the rpcBackend
flag rather than a single value.
It has been replaced by equivalent functionality using a newer gRPC API. However this support was only intended for use in integration tests. In production we recommend the use of etcd or a gRPC load balancer.
Log list tools updated to use the correct v2 URL (from v2_beta previously).
Merged upstream Go 1.13 and Go 1.14 changes (with the exception of https://github.com/golang/go/commit/14521198679e, to allow old certs using a malformed root still to be logged).
Merged upstream Go 1.14 changes.
Added VerifySCTWithVerifier() to verify SCTs using a given ct.SignatureVerifier.
Configuration files that previously had to be text-encoded Protobuf messages can now alternatively be binary-encoded instead.
PostAndParseWithRetry
error logging now includes log URI in messages.All the code for this, except for the x509ext package, has been moved over to the trillian-examples repository.
This keeps the code together and removes a circular dependency between the two repositories. The package layout and structure remains the same so updating should just mean changing any relevant import paths.
A circular dependency on the monologue repository has been removed.
A circular dependency on the trillian-examples repository has been removed.
The version of trillian in use has been updated to 1.3.11. This has required various other dependency updates including gRPC and protobuf. This code now uses the v2 proto API. The Travis tests now expect the 3.11.4 version of protoc.
The version of etcd in use has been switched to the one from go.etcd.io
.
Most of the above changes are to align versions more closely with the ones used in the trillian repository.
Published 2019-11-14 15:00:00 +0000 UTC
The reject_expired
and reject_unexpired
configuration fields for the CTFE
have been changed so that their behaviour reflects their name:
reject_expired
only rejects expired certificates (i.e. it now allows
not-yet-valid certificates).reject_unexpired
only allows expired certificates (i.e. it now rejects
not-yet-valid certificates).A reject_extensions
configuration field for the CTFE was added, this allows
submissions to be rejected if they contain an extension with any of the
specified OIDs.
A frozen_sth
configuration field for the CTFE was added. This STH will be
served permanently. It must be signed by the log's private key.
A /healthz
URL has been added which responds with HTTP 200 OK and the string
"ok" when the server is up.
The ct_server
binary has these new flags:
mask_internal_errors
- Removes error strings from HTTP 500 responses
(Internal Server Error)Removed default values for --metrics_endpoint
and --log_rpc_server
flags.
This makes it easier to get the documented "unset" behaviour.
The CTFE exports these new metrics:
is_mirror
- set to 1 for mirror logs (copies of logs hosted elsewhere)frozen_sth_timestamp
- time of the frozen Signed Tree Head in milliseconds
since the epochUpdated prometheus-to-sd to v0.5.2.
A dedicated node pool is no longer required by the Kubernetes manifests.
A new package has been created for parsing, searching and creating JSON log
lists compatible with the
v2 schema:
github.com/google/certificate-transparency-go/loglist2
.
Our Docker images have been updated to use Go 1.11 and Distroless base images.
The CTFE Docker image now sets ENTRYPOINT
.
The jsonclient
package now copes with empty HTTP responses. The user-agent
header it sends can now be specified.
Merged upstream changes from Go 1.12 into the asn1
and x509
packages.
Added a "lax" tag to asn1
that applies recursively and makes some checks more
relaxed:
The following x509
functions will now return x509.NonFatalErrors
if ASN.1
parsing fails in strict mode but succeeds in lax mode. Previously, they only
attempted strict mode parsing.
x509.ParseTBSCertificate()
x509.ParseCertificate()
x509.ParseCertificates()
The x509
package will now treat a negative RSA modulus as a non-fatal error.
The x509
package now supports RSASES-OAEP and Ed25519 keys.
The ctclient
tool now defaults to using
all_logs_list.json
instead of log_list.json.
This can be overridden using the --log_list
flag.
It can now perform inclusion checks on pre-certificates.
It has these new commands:
bisect
- Finds a log entry given a timestamp.It has these new flags:
--chain
- Displays the entire certificate chain--dns_server
- The DNS server to direct queries to (system resolver by
default)--skip_https_verify
- Skips verification of the HTTPS connection--timestamp
- Timestamp to use for bisect
and inclusion
commands (for
inclusion
, only if --leaf_hash is not used)It now accepts hex or base64-encoded strings for the --tree_hash
,
--prev_hash
and --leaf_hash
flags.
The certcheck
tool has these new flags:
--check_time
- Check current validity of certificate (replaces
--timecheck
)--check_name
- Check validity of certificate name--check_eku
- Check validity of EKU nesting--check_path_len
- Check validity of path length constraint--check_name_constraint
- Check name constraints--check_unknown_critical_exts
- Check for unknown critical extensions
(replaces --ignore_unknown_critical_exts
)--strict
- Set non-zero exit code for non-fatal errors in parsingThe sctcheck
tool has these new flags:
--check_inclusion
- Checks that the SCT was honoured (i.e. the
corresponding certificate was included in the issuing CT log)The ct_hammer
tool has these new flags:
--duplicate_chance
- Allows setting the probability of the hammer sending
a duplicate submission.Published 2018-08-20 10:11:04 +0000 UTC
CTFE
no longer prints certificate chains as long byte strings in messages when handler errors occur. This was obscuring the reason for the failure and wasn't particularly useful.
CTFE
now has a global log URL path prefix flag and a configuration proto for a log specific path. The latter should help for various migration strategies if existing C++ server logs are going to be converted to run on the new code.
More progress has been made on log mirroring. We believe that it's now at the point where testing can begin.
The certcheck
and ct_hammer
utilities have received more enhancements.
x509
and x509util
now support Subject Information Access and additional extensions for RPKI / RFC 3779.
scanner
/ fixchain
and some other command line utilities now have better handling of non-fatal errors.
Commit 3629d6846518309d22c16fee15d1007262a459d2 Download zip
Published 2018-07-05 09:21:34 +0000 UTC
Enhancements have been made to various utilities including scanner
, sctcheck
, loglist
and x509util
.
The allow_verification_with_non_compliant_keys
flag has been removed from signatures.go
.
An implementation of Gossip has been added. See the gossip/minimal
package for more information.
An X.509 compatibility issue for Go 1.11 has been fixed. This should be backwards compatible with 1.10.
Commit 37a384cd035e722ea46e55029093e26687138edf Download zip
Published 2018-06-01 13:51:52 +0000 UTC
CTFE now supports Trillian Log's explicit quota API; quota can be requested based on the remote user's IP, as well as per-issuing certificate in submitted chains.
Commit 8736a411b4ff214ea20687e46c2b67d66ebd83fc Download zip
Published 2018-06-01 14:28:20 +0000 UTC
Work on a log migration tool (Migrillian) is in progress. This is not yet ready for production use but will provide features for mirroring and migrating logs.
The RequestLog
API allows for logging of SCTs when they are issued by CTFE.
The CT Go client now supports GetEntryAndProof
. Utilities have been switched over to use the glog
package.
Commit 77abf2dac5410a62c04ac1c662c6d0fa54afc2dc Download zip
Published 2018-06-01 14:25:16 +0000 UTC
Now uses Merkle Tree verification from Trillian.
The CT server now supports CORS.
Request tracing added using OpenCensus. For GCE / K8 it just requires the flag to be enabled to export traces to Stackdriver. Other environments may differ.
A demo script was added that goes through setting up a simple deployment suitable for development / demo purposes. This may be useful for those new to the project.
Commit 3c3d22ce946447d047a03228ebb4a41e3e4eb15b Download zip
Published 2018-06-01 14:22:23 +0000 UTC
An integration test was added that goes through a create / drain queue / freeze lifecycle for a log.
Changes to x509
were merged from Go 1.10.1.
Commit a72423d09b410b80673fd1135ba1022d04bac6cd Download zip
Published 2018-06-01 14:20:32 +0000 UTC
Facilities were added to the x509
package to control whether verification checks are applied.
Log server requests are now balanced using gRPClb
.
For Kubernetes, metrics can be published to Stackdriver monitoring.
Commit 684d6eee6092774e54d301ccad0ed61bc8d010c1 Download zip
Published 2018-06-01 14:15:37 +0000 UTC
Support for SQLite was removed. This motivation was ongoing test flakiness caused by multi-user access. This database may work for an embedded scenario but is not suitable for use in a server environment.
A LeafHashForLeaf
client API was added and is now used by the CT client and integration tests.
Commit 698cd6a661196db4b2e71437422178ffe8705006 Download zip
Published 2018-06-01 14:15:21 +0000 UTC
Some of our custom crypto package that were wrapping calls to the standard package have been removed and the base features used directly.
Updates were made to GCE ingress and health checks.
The log list utility can verify signatures.
Commit 480c3654a70c5383b9543ec784203030aedbd3a5 Download zip
Published 2018-06-01 14:13:42 +0000 UTC
The CT client can now use a JSON loglist to find logs.
CTFE had a fix applied for preissued precerts.
A DNS client was added and CT client was extended to support DNS retrieval.
Commit 74c06c95e0b304a050a1c33764c8a01d653a16e3 Download zip
Published 2018-06-01 14:12:18 +0000 UTC
Updates to Kubernetes configs, mostly related to running a CI instance.
Commit 0856acca7e0ab7f082ae83a1fbb5d21160962efc Download zip
Published 2018-06-01 14:09:47 +0000 UTC
The CT client was using the wrong protobuffer library package. To guard against this in future a check has been added to our lint config.
The x509
and asn1
packages have had upstream fixes applied from Go 1.10rc1.
Commit 1bec4527572c443752ad4f2830bef88be0533236 Download zip
Published 2018-06-01 14:11:13 +0000 UTC
The scanner
utility now displays throughput stats.
Build instructions and README files were updated.
The certcheck
utility can be told to ignore unknown critical X.509 extensions.
Commit c06833528d04a94eed0c775104d1107bab9ae17c Download zip
Published 2018-06-01 14:06:44 +0000 UTC
Commit e8b02c60f294b503dbb67de0868143f5d4935e56 Download zip
Published 2018-06-01 14:06:13 +0000 UTC
An issue was fixed with CTFE signature caching. In an unlikely set of circumstances this could lead to log mis-operation. While the chances of this are small, we recommend that versions prior to this one are not deployed.
Commit 52c0590bd3b4b80c5497005b0f47e10557425eeb Download zip
Published 2018-06-01 14:04:22 +0000 UTC
The crlcheck
utility has had several fixes and enhancements. Additionally the hammer
now supports temporal logs.
Commit 3955e4a00c42e83ff17ce25003976159c5d0f0f9 Download zip
Published 2018-06-01 14:02:58 +0000 UTC
This release is mostly fixes to the x509
and asn1
packages. Some command line utilities were also updated.
Commit ae40d07cce12f1227c6e658e61c9dddb7646f97b Download zip
Published 2018-06-01 14:02:07 +0000 UTC
Support was added to allow CTFE to use multiple backends, each serving a distinct set of logs. It allows for e.g. regional backend deployment with common frontend servers.
Commit 62023ed90b41fa40854957b5dec7d9d73594723f Download zip
Published 2018-06-01 14:01:11 +0000 UTC
After the Go 1.9 migration references to anything other than the standard context
package have been removed. This is the only one that should be used from now on.
Commit b28beed8b9aceacc705e0ff4a11d435a310e3d97 Download zip
Published 2018-06-01 14:00:00 +0000 UTC
Go 1.9 is now required to build the code.
Commit 3aed33d672ee43f04b1e8a00b25ca3e2e2e74309 Download zip
Published 2018-06-01 13:59:29 +0000 UTC
Commit c28796cc21776667fb05d6300e32d9517be96515 Download zip
Published 2018-06-01 13:59:00 +0000 UTC
This is the point that corresponds to the 1.0 release in the trillian repo.
Commit abb79e468b6f3bbd48d1ab0c9e68febf80d52c4d Download zip