Hi Quinn,
Thank you very much for your detailed investigation and report.
As you suggested, we are now preparing to contact our Certificate Authority (CA). In the meantime, while we await their response, we have conducted our own preliminary investigation into the SCTs, and we would like to share our methodology and findings.
Our goal was to verify if the SCT Log IDs served by i.socdm.com are included in the trusted CT log lists provided by Apple and Google.
Our verification process is as follows:
Extract the Log IDs from the server's certificate chain and convert them to Base64.
Check for the presence of these Base64 Log IDs within the official log lists from Apple and Google.
Commands and References Used:
Log ID Extraction Command:
domain="i.socdm.com"
log_ids=$(echo | openssl s_client -servername "$domain" -connect "$domain:443" 2>/dev/null | \
openssl x509 -text -noout | \
awk '/Log ID/{sub(/.*: /,""); printf "%s", $0; getline; sub(/^[ \t]+/, ""); print}' | \
tr -d ':')
while IFS= read -r hex_id; do
base64_id=$(echo "$hex_id" | xxd -r -p | base64)
echo $base64_id
done <<< "$log_ids"
Apple: https://valid.apple.com/ct/log_list/current_log_list.json
Google: https://www.gstatic.com/ct/log_list/v3/log_list.json
Preliminary Findings:
Based on our current understanding and the verification method described above, it appears that the extracted Log IDs are present in both Apple's and Google's trusted lists. However, we are not certain if our verification method is exhaustive, which is one of the reasons we are also consulting our CA.
Next Steps:
We will continue our investigation into the CT configuration. However, as you noted, debugging CT issues can be complex, and we anticipate challenges.
Given this, we would appreciate it if your team could continue to investigate the possibility of an issue within iOS itself.
We will update the bug report (FB19729881) as soon as we have a response from our CA or any further findings from our side.
Thank you for your continued support.