I installed the Let’s Encrypt certificates on my test-server and I was expecting that the Let’s Encrypt certificates where using certificate transparancy (CT). But when I look at the transparancy indicator in Chrome, it says that the server didn’t provide CT information. I see this:
Certificates are correctly sent to log; but let’s encrypt does not yet include the SignedCertificateTimestamp in the issued certificate or in the OCSP.
I managed to make it work by resubmiting my cert+intermediate to log (log.certly.io); Got the response and encoded a PEM TLS extention with this signature into serverinfo.pem
In apache i did not used the mod_ssl_ct (that seems to me a bit overkill), but added a SSLOpenSSLConfCmd ServerInfoFile /path/to/serverinfo.pem
You can check that your server is sending this by using openssl s_client -serverinfo 18 -connect serverr:443 -servername server < /dev/null
you shoud get a
CONNECTED(00000003)
-----BEGIN SERVERINFO FOR EXTENSION 18-----
[data]
-----END SERVERINFO FOR EXTENSION 18-----
depth=1 C = US, O = Let’s Encrypt, CN = Let’s Encrypt Authority X1
I guess let’s encrypt may start to use ocsp later ?
@jbvignaud: You’ve got it exactly correct, thanks for providing such detailed info! Let’s Encrypt currently submits to logs but does not provide SCTs. We eventually plan to provide SCTs in OCSP responses. This has mostly been a matter of prioritization for launch. Additionally, the Golang OCSP library does not yet support extensions, which we will have to fix before we are able to provide SCTs via OCSP. If anyone would like to volunteer to implement that, it would be very helpful!
thanks for replaying , test.com its web server i create locally in vm inside my laptop under centos 7 for testing ,so can i test it or should i have domain (real domain ) for testing .?