# ctfetch Tools for working with Certificate Transparency log tiles. ## Install ```bash GOPRIVATE=git.ipng.ch go install git.ipng.ch/certificate-transparency/ctfetch/cmd/ctfetch@latest ``` The GOPRIVATE environment variable skips _Go checksum database_ and _Go module proxy_ as these do not index modules on `git.ipng.ch`. ## Usage `ctfetch` operates in two modes depending on the arguments given. ### Leaf-index mode Fetch a specific entry (or all entries in its tile) by leaf index: ```bash ctfetch [flags] [+sct] [+issuer] [+ctlog] [+all] ``` **Examples:** Dump a specific entry: ```bash ctfetch https://halloumi2026h1.mon.ct.ipng.ch 629794635 ``` Dump with SCTs, issuer chain, and CT log details: ```bash ctfetch https://halloumi2026h1.mon.ct.ipng.ch 629794635 +all ``` ### Tile-dump mode Fetch all entries from a tile URL or a local file. Automatically detects data tiles (log entries) and hash tiles (Merkle tree hashes). ```bash ctfetch [flags] [+sct] [+issuer] [+ctlog] [+all] ``` **Examples:** Data tile from a URL: ```bash ctfetch https://halloumi2026h1.mon.ct.ipng.ch/tile/data/x002/x460/135 ``` Data tile with SCTs and CT log details: ```bash ctfetch https://halloumi2026h1.mon.ct.ipng.ch/tile/data/x002/x460/135 +sct +ctlog ``` Hash tile from a URL: ```bash ctfetch https://halloumi2026h1.mon.ct.ipng.ch/tile/0/x100/999 ``` Data tile from a local file (with issuer resolution): ```bash ctfetch --monitoring-url https://halloumi2026h1.mon.ct.ipng.ch tile.bin +issuer ``` ## Hash tiles vs data tiles A Static CT log stores two kinds of tiles: **Data tiles** (`/tile/data/...`) contain the actual log entries — DER-encoded certificates and precertificates along with their metadata (leaf index, timestamp, chain fingerprints, etc.). These are what `ctfetch` parses into structured JSON. The output modifiers `+sct`, `+issuer`, `+ctlog`, and `+all` all operate on data tiles. **Hash tiles** (`/tile/N/...`, where N is a tree level ≥ 0) contain the internal nodes of the Merkle tree — rows of raw 32-byte SHA-256 hashes used for inclusion and consistency proofs. There are no certificates in a hash tile; `ctfetch` outputs only the list of hashes. Using `+sct`, `+issuer`, `+ctlog`, or `+all` with a hash tile is an error. The tree is organised so that level 0 hashes cover individual leaves (each is `SHA-256(0x00 || MerkleTreeLeaf)`), and each higher level hashes pairs of nodes from the level below. The tile URL encodes the level: `/tile/0/...` is level 0, `/tile/1/...` is level 1, and so on. ## Output modifiers | Modifier | Description | |---|---| | `+sct` | Parse and include embedded Signed Certificate Timestamps from final (non-precert) certificates | | `+issuer` | Fetch and include issuer certificate details from the log's `/issuer/` endpoint | | `+ctlog` | Look up each SCT's log ID in the CT log list and include operator/state details | | `+all` | Enable all of `+sct`, `+issuer`, and `+ctlog` at once | ## Flags | Flag | Default | Description | |---|---|---| | `--logs-list-url` | `https://www.gstatic.com/ct/log_list/v3/all_logs_list.json` | URL of the CT log list JSON used for `+ctlog` lookups | | `--monitoring-url` | _(none)_ | Log root URL for issuer lookups when input is a local file | ## Notes - In tile-dump mode with a tile URL, `+issuer` automatically derives the log root by stripping the `/tile/...` path. With a local file, `--monitoring-url` must be provided. - Partial tiles (`.p/N` suffix) are tried first; on 404 the full tile is fetched automatically. - The CT log list and issuer certificates are cached in memory, so each unique resource is fetched only once per invocation.