Growth Of HTTPS Public Logs (CT)

Dan Cvrcek
Cyber Shards
Published in
3 min readSep 11, 2018

As we have a database of all the issued public certificates, we started looking at some of the data. This is a quick note about the frequency of updates of certificate transparency (CT) logs.

We looked at 27 CT logs, which we have been processing and this note covers two aspects:

  • frequency of updates — how long would your new certificate take to appear in CT logs;
  • growth of the logs — how many items are being added to each of the logs to get a feeling for the dynamics of the ecosystem.

The following data has been collected over 6 weeks and the charts use ten measurements collected during that period.

Frequency of Updates of CT Logs

Although CT logs should provide a quick information about new certificates, not all the logs are updated with the same frequency.

As you can see in the table below, the variations are huge — from real-time updates of the Google CT logs called “argon”, to 6 hours update frequency of Symantec logs (ct, sirius and vega).

COMODO updates its logs mammoth and sabre every 10 minutes, DigiCert has 60 minute update intervals for the series of yeti logs (yeti2018, yeti2019, yeti2020, yeti2021 and yeti2022), just like Google for most of their CT logs.

Growth of Logs

The next thing I wondered was whether the big CT logs are quicker to add new entries or the other way round. So let’s start with how each of the CT logs grows.

Well as Argon2018 shows updates can be made quickly as it is the second biggest CT log after Rocketeer.

As you can see there are a few logs that grow significantly faster than others. Rocketeer and Pilot are among the biggest CT logs with over 410 million and 360 million entries respectively. Argon2018, Icarus and Nimbus2018 also have over 200 million entries.

The next chart suggests that the relative growth of CT logs has somewhat changed over the 6 week period so while snapshot figures give us a good indication, they don’t tell the whole story.

So where does it leave us. If you’re worried about attacks and unauthorized certificates and their exploitation for cyber attacks, you may want to find out which CT logs are used by your certificate issuer.

It also suggests that a quick notification system has its value to minimize any additional latency in discovering potential attacks against your internet services.

Why we’re looking into it?

We need a good source of information for real-time notifications for our KeyChest.net users. A new version is coming soon and we have built our own lookup table (currently with 6,600,000,000 rows) so we can provide you with the best possible analytics.

--

--

Dan Cvrcek
Cyber Shards

Security wizard, banking consultant, turning technology into magic and back. Past: Uni. of Cambridge, Deloitte, banks.