question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Enhanced TLS certificate metadata

See original GitHub issue

The current specification only declares a handful of TLS certificate fields. Additionally, these fields are centered around an active connection, not so much around TLS metadata. For instance tls.servername specifies that it be the servername requested by the client. If the cert is a wildcard cert, there is no place in the schema for that.

There is a certificates field, but that is somewhat under-defined. Should the certs be x.509 PEM or DER encoded? I think that description needs to be tightened up as well.

I propose that we the full list of x.509 fields to ECS, and make it clear that tls.* should be exclusively what’s in the certificate(s), not the context around the given connection.

Furthermore, I think we should remove the tls.servername field, destination.hostname should suffice for use in those situations.

Issue Analytics

  • State:closed
  • Created 5 years ago
  • Comments:15 (6 by maintainers)

github_iconTop GitHub Comments

3reactions
andrewkrohcommented, Aug 1, 2018

Packetbeat has fairly extensive TLS metadata.

1reaction
webmatcommented, Aug 6, 2018

Not sure why, but I also feel uneasy about calculating a boolean based on an expiration date.

On the other hand I think it would be really useful to have. It’s a very important thing that’s straightforward to alert on, or display in red & so on. Everyone should catch those earlier by working off of the expiration date, but somehow there’s always that one cert somewhere, that slips through the cracks 😃

So I’m in favour 👍

Read more comments on GitHub >

github_iconTop Results From Across the Web

SSL Certificate Metadata: A Fast Track to Better Security
There is a better way: Gigamon's SSL Certificate metadata—available as part of the GigaSECURE Security Delivery Platform.
Read more >
Use enhanced TLS (HTTPS) - Akamai TechDocs
Enhanced TLS enables the most secure delivery over HTTPS with a level 3 (L3) certificate. It's engineered to meet the needs of sites...
Read more >
5 TLS Certificate Management Best Practices - Keyfactor
Keyfactor provides an audit record of the lifecycle of the certificates from issuance, deployment, removal, revocation, and metadata updates.
Read more >
Securing Web Transactions: TLS Server Certificate Management
medium enterprises better manage TLS server certificates by: ... metadata fields associated with each certificate for tracking relevant infor-.
Read more >
Automate TLS certificate management for Anthos Service ...
Automate TLS certificate management for Anthos Service Mesh ingress gateway using ... path: spec.template.metadata.labels.sidecar\.istio\.io/inject
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found