Perform validation of Signed Certificate Timestamps, as used for Certificate Transparency. See RFC6962 for more details.
||This record is used to store information about the SCTs that are encountered in a SSL connection.|
||List of the different sources for Signed Certificate Timestamp|
The version of the encountered SCT (should always be 0 for v1).
The ID of the log issuing this SCT.
The timestamp at which this SCT was issued measured since the epoch (January 1, 1970, 00:00), ignoring leap seconds, in milliseconds. Not converted to a Zeek timestamp because we need the exact value for validation.
The signature algorithm used for this sct.
The hash algorithm used for this sct.
The signature of this SCT.
Source of this SCT.
Validation result of this SCT.
This record is used to store information about the SCTs that are encountered in a SSL connection.
Signed Certificate Timestamp was encountered in the extension of an X.509 certificate.
Signed Certificate Timestamp was encountered in an TLS session extension.
Signed Certificate Timestamp was encountered in the extension of an stapled OCSP reply.
List of the different sources for Signed Certificate Timestamp