Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authentication concerns for the client authentication requests #16

Open
thomwiggers opened this issue Jul 28, 2021 · 2 comments
Open

Authentication concerns for the client authentication requests #16

thomwiggers opened this issue Jul 28, 2021 · 2 comments

Comments

@thomwiggers
Copy link
Member

Came up during the IETF meeting:

David Benjamin:

I'm concerned about authenticating the server's request to the client. Client certificate decisions can result in interesting side effects, like unlocking smartcards or prompting the user. Having something so visible not be authenticated is pretty scary.

@thomwiggers
Copy link
Member Author

I don't think there's any way to solve this problem due to the nature of implicit authentication. As a consequence, we might need to allow clients to drop such a request and then have servers try again using post-handshake authentication.

We might use e.g. the TLS flags extension to allow the client to indicate to the server that it won't accept certificate requests during the handshake. This flag could then be set by default in e.g. browsers, where the interactive pop-up is especially problematic.

@thomwiggers
Copy link
Member Author

thomwiggers commented Jan 12, 2022

Another problem with client authentication requests: an attacker that impersonates a server to a client might submit the request, and learn if the client owns a certificate through the number of messages sent (it can't read it). Should clients be allowed/required to send dummy messages if they don't have a cert to hide this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant