Home Books Training Newsletter Resources
Sign up Log in

Cryptography & Security Newsletter

129

Waiting for Static CT Logs

30 September 2025

Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.

NEWSLETTER SPONSOR

Red Sift's Guide to Post-Quantum Cryptography. Our concise and authoritative guide to post-quantum cryptography is packed with all the information you need to kickstart your migration and protect your critical systems from "store now, decrypt later" attacks. RED SIFT

Certificate Transparency (CT) has been a resounding success. It took about a decade, but we went from a world in which we don’t know what certificates are issued, why, and to whom, to complete visibility—at least for Web PKI, where CT is mandatory. This combination of visibility with increased scrutiny, continuous improvements in the detailed technical requirements for issuance, and linting helped us largely get Web PKI in order.

Equally important, the success of CT also helped establish the more general concept of transparency as a key technique for establishing trust in complex ecosystems. We’re already seeing transparency implemented for binaries and, in the future, for private keys and perhaps even domain validation and revocation.

Growing Pains

Behind the scenes, it hasn’t necessarily been easy. One terrifying aspect of CT, as currently implemented, is that it creates an issuance bottleneck. Previously, certification authorities (CAs) could issue certificates independently, but now they need to first obtain signatures from multiple CT logs. If the required minimum number of signatures cannot be obtained, then issuance cannot proceed.

So far we haven’t seen global availability issues caused by CT, but regular readers of this newsletter and subscribers to the ct-policy mailing list will know of the variety of problems faced by the organizations maintaining the CT infrastructure. There are constant issues with databases, storage limitations, failures, rate limiting, and the like.

Some types of failure are catastrophic and require logs to be retired. When that happens, certificate issuance has to shift to the remaining active logs. We’ve been able to do this so far, but it’s not clear how prepared we are for wider failures that might occur from, for example, reduced certificate lifetimes. In addition, are we prepared to defend the issuance infrastructure from deliberate attack?

Enter Static CT

As it stands, the bulk of the world’s certificates are recorded to CT logs operated by five organizations. In alphabetical order, they are Cloudflare, DigiCert, Google, Let’s Encrypt, and Sectigo. These days, many CT logs contain in excess of two billion certificates, and that’s after temporal sharding was introduced. With certificates allowed to last for only forty-seven days by March 2029, it’s guaranteed that the number of certificates will at least double by then. Can the system cope?

A new approach called Static CT will help. Designed by Filippo Valsorda with help from Let’s Encrypt and others, Static CT is an iteration of CT that is simpler to operate, costs less, and scales reads through caching and compression. According to Filippo, Tuscolo, the first Static CT log, costs about $10,000/year to run. The hope is that the new design will not only help existing organizations but also encourage new operators to join the ecosystem.

Let’s Encrypt is leading the adoption of Static CT with the Sycamore and Willow logs, both qualified. It also recently decided not to use the original (RFC 6962) design any more. There is also a new entrant: IPng Networks is the first smaller independent organization to join (not counting Geomys, which is affiliated with Filippo), with two sharded production logs: Gouda is already qualified, while Halloumi is in the works.

It’s not likely that the evolution of CT will end with Static CT. In fact, the next challenge will be a possible transition to a new design that will be safe against quantum computers that can break cryptography. We’ll talk more about that in due course.

Subscribe to the Cryptography & Security Newsletter

This subscription is just for the newsletter; we won't send you anything else.

Red Sift's Guide to Post-Quantum Cryptography

When it comes to post-quantum cryptography, there is a wealth of information available, but differentiating between what is immediately relevant and what isn’t can be tricky. As a treat this month, and to stay ahead of the noise, I am happy to share with you my concise guide to post-quantum cryptography. I've filled it with everything you need to know, and it's in a small package. Disclosure: I wrote this guide for my employer, Red Sift, who is also this month's sponsor. RED SIFT

Short News

  • Over 500 GB of source code, work logs, and internal communication records pertaining to the technology behind (or related to) the Great Firewall of China has been leaked.
  • From February 2024 through August 2025, Fina CA issued twelve unauthorized certificates for the 1.1.1.1 IP address used by Cloudflare.
  • Akamai and Amazon CloudFront have added support for post-quantum cryptography.
  • Apple is looking to hire a PKI engineer for its Crypto Services team.
  • The Internet Security Research Group is hiring fundraising professionals.
  • IPng Networks has published its third post covering the details of CT log operation.
  • Jan Schaumman has looked at the deployment of post-quantum cryptography among top websites.
  • There is some movement toward QWAC adoption (via Stephen Davidson); ETSI EN 319 411-2 and ETSI TS 119 411-5 are the relevant standards.
  • Trail of Bits released Algo v2.0.0, the next generation of its personal VPN tooling.
  • In Russia, a new, government-sponsored chat app is being preinstalled on all new phones. It’s been called a privacy nightmare.
  • Virtual SIM cards (eSIMs) are making it easier to switch phone providers, but many seem to route network traffic via unexpected remote places, such as China. The related Hacker News discussion has some additional interesting information.
  • Luke Valenta writes at length about the difference between post-quantum cryptography and quantum security technology. You need the former, not necessarily the latter.
  • Video recordings of DigiCert’s World Quantum Readiness day are now available.
  • Apple’s new phones come with a new feature called Memory Integrity Enforcement, which makes exploitation more difficult.
  • A whistleblower has sued Meta over alleged WhatsApp security flaws.
  • Denmark, which has held the EU Council Presidency since July, is pushing hard to adopt Chat Control. The country is pursuing the same proposal that previously failed. An article from Metalhearf’s Blog has more information on the countries’ positions.
  • The previously failed attack on lattice-based cryptography is allegedly coming back after fixes.
  • Over at CA/Browser Forum, post-quantum cryptography is now part of S/MIME Basic Requirements, via ballot SMC013.
  • Filippo Valsorda is looking at how to best archive CT logs for posterity.
  • David Adrian (who works for Google on Chrome security) doesn’t think Web PKI needs revocation.
  • Tile trackers, used by 88 million people worldwide, send critical data without encryption.

Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.

Remote and trainer-led, with small classes and a choice of timezones.

Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.

Find out More

@feistyduck

Books

  • Bulletproof TLS and PKI
  • ModSecurity Handbook
  • OpenSSL Cookbook

Training

  • Practical TLS and PKI

Resources

  • Newsletter
  • SSL/TLS and PKI History
  • Archived Books
  • Bulletproof TLS Guide

Company

  • Support
  • Website Terms of Use
  • Terms and Conditions
  • Privacy Policy
  • About Us