Certificate Transparency in Firefox

What Certificate Transparency (CT) Is and How It Works

  • Described as an append-only, tamper-evident public log (like a “git repo” or Merkle tree) of all certificates issued by public CAs.
  • When a public CA issues a cert, it submits a “pre-certificate” to multiple CT logs and receives signed timestamps (SCTs) promising inclusion.
  • Browsers require proof (SCTs, often embedded in the cert) or they reject the certificate.
  • This makes it much harder for a CA—whether compromised, coerced, or negligent—to silently issue a bogus certificate without it being visible in public logs.

Benefits and Enforcement in Firefox

  • Firefox is “catching up” to Chrome and others by enforcing CT for publicly trusted roots in Mozilla’s store.
  • Regular users rarely see issues; main benefit is protection during the window between misissuance and remediation.
  • CT is enforced only for public CAs; enterprise/private CAs and user-installed roots are exempt, so corporate interception and tools like mitmproxy still work when using custom roots.

What Site Operators Can Do with CT

  • Operators are expected to monitor CT logs for unauthorized certs and, if found, report them to the issuing CA and relevant browser root programs.
  • CA/Browser policies (Baseline Requirements, Mozilla root policy) require revocation and incident reporting; repeated failures can get a CA removed from root stores.
  • Several participants promote CT monitors (e.g., Merklemap, crt.sh) used by security teams, infra engineers, and brand protection.

CT vs CAA, DANE, and DNSSEC

  • CAA: limits which CAs may issue for a domain; CT: detects misissuance after the fact. Multiple commenters say they are complementary and both should be used.
  • DANE/TLSA and DNSSEC: debated heavily; critics call DNSSEC a weak or “dead” PKI with poor deployment and governance, and argue CT+WebPKI is more practical and auditable.
  • Some push for combined models (DANE + CT), others argue complexity and limited incremental security gains.

Privacy, Obscurity, and Mapping Infrastructure

  • Concern: CT exposes internal hostnames and makes infrastructure mapping trivial, creating privacy and potential security issues.
  • Counterpoint: relying on obscurity is dangerous; public-facing endpoints are already easily discoverable (e.g., via passive DNS), and CT improves accountability without single points of failure (multiple independent logs).
  • Suggested mitigations: use wildcards or private CAs for sensitive internal domains.

Deployment Details and Miscellany

  • Some platform-specific differences observed (e.g., Debian builds, Android) likely tied to config flags and telemetry rollout.
  • Timing edges: newly issued certs can briefly trigger CT errors due to clock skew and non-backdated SCTs.
  • A few commenters worry about Firefox’s broader data-collection direction or its reliance on Chrome’s list of trusted CT logs, seeing this as alignment with Google’s ecosystem.