Podcast
Root Causes 216: What is crt.sh?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 11, 2022
One of the foundational tools for monitoring and understanding public SSL certificates is crt.sh, created and maintained by Sectigo's own Rob Stradling. In this episode our hosts explain what crt.sh does and why it is so popular among SSL industry watchers.
Podcast Transcript
Lightly edited for flow and brevity.
But what does that mean? Like how does a member of the public go and audit it? So, you gonna get this log and it’s essentially, let’s call it a database – it’s not a database but for want of a better word, it’s this big giant block of data and you are gonna go through and you are gonna parse it out and you are gonna pull information and somehow make sense of this. How is your average person going to do that? Some years ago, an engineer here at Sectigo named Rob Stradling actually built a tool to do exactly that and the domain is crt.sh. That is the domain that Rob obtained and as a result, that is what the tool is now called and crt.sh is open, it’s available to the public and people can come in and search using a variety of methods and pull out datasets of certificates that meet certain criteria and see what they are. They can be active certificates or certificates that are already revoked or expired and understand what’s going on or what went on in the past with any public CA.
What I would suggest for everybody, whether you are technical or non-technical, go to your browser, type in crt.sh and just type in a domain that you would like to see what certificates were issued for. It could be yours, it could be somebody else’s, doesn’t matter. Hit search. And what you are gonna see in the initial list is a list of certificates and that first column on the left hand side is going to be that Rob Stradling’s ID for all the certificates – crt.sh ID and that actually comes out always as a clickable item, which then if you click that, that actually gives you very, very similar information to the actual certificate itself, which is, again, similar to what you would see if you were browsing the website using that certificate and had investigated the certificate fields. Therefore, you can go right down to a very detailed level. From a very high level of, hey, show me certificates to a list of domains all the way down to, alright, now I really want to investigate this certificate. I can click on an item in the list and go down even further. This is what the tool does at a very high level and I invite everybody to try it out.

