Hi Pierre,

This is pretty far afield from TLS. I would suggest the secdispatch mailing
list.

Best,
-Ekr


On Sun, Jun 29, 2025 at 3:45 AM Pierre Barre <pie...@barre.sh> wrote:

> Hi all,
>
> I've just submitted a new individual draft that extends RFC6962
> Certificate
> Transparency with a page-based retrieval mechanism:
>
> https://datatracker.ietf.org/doc/html/draft-trans-pages-00
>
> This proposal offers a simpler alternative to the "Static API" approach
> while maintaining full RFC 6962 compatibility. Unlike the Static API which
> requires significant client changes and complexity, this is just an
> incremental extension that adds optional endpoints to existing CT logs.
>
> The draft addresses several operational challenges with the current
> CT get-entries API:
>
> 1. Arbitrary range requests make caching effectively impossible
> 2. Base64 encoding adds ~33% bandwidth overhead
> 3. Certificate chains are duplicated for every entry
> 4. Variable response sizes complicate resource planning
>
> The extension introduces:
> - Fixed-size pages (e.g., 1000 entries) that are immutable once full
> - Binary format eliminating base64 overhead
> - Certificate deduplication via SHA-256 references
> - Simple discovery mechanism
> - Full backward compatibility - existing RFC 6962 clients continue to work
>
> Key advantages over Static API:
> - Much simpler for clients to implement
> - No breaking changes to existing CT infrastructure
> - Allows incremental adoption
> - Enables CDN deployment while keeping the familiar CT log model
>
> I'm particularly interested in feedback from:
> - CT log operators on operational benefits
> - Client implementers on the API design
> - Anyone with Static API implementation experience for comparison
>
> I've implemented this in my CT log: https://github.com/Barre/compact_log
>
>
> Performance comparison on a real log with 279,332 entries shows the Pages
> Extension is more efficient than Static CT API:
>
> Pages Extension:
> - 280 requests (vs 1,092 for Static CT)
> - 212 MB transfer (vs 243 MB for Static CT)
> - 756 bytes/entry (vs 869 bytes/entry)
> - Sequential read test: 109 seconds (vs 143 seconds)
> - Uses only 87.2% of Static CT bandwidth
>
> The binary format also compresses well with standard HTTP compression:
> - Brotli: 56% size reduction
> - Gzip: 58% size reduction
>
> Since the trans WG has concluded, I'm bringing this to TLS as the most
> relevant venue for CT implementation discussions.
>
> Thanks,
> Pierre
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to