You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm concerned about authenticating the server's request to the client. Client certificate decisions can result in interesting side effects, like unlocking smartcards or prompting the user. Having something so visible not be authenticated is pretty scary.
The text was updated successfully, but these errors were encountered:
I don't think there's any way to solve this problem due to the nature of implicit authentication. As a consequence, we might need to allow clients to drop such a request and then have servers try again using post-handshake authentication.
We might use e.g. the TLS flags extension to allow the client to indicate to the server that it won't accept certificate requests during the handshake. This flag could then be set by default in e.g. browsers, where the interactive pop-up is especially problematic.
Another problem with client authentication requests: an attacker that impersonates a server to a client might submit the request, and learn if the client owns a certificate through the number of messages sent (it can't read it). Should clients be allowed/required to send dummy messages if they don't have a cert to hide this?
Came up during the IETF meeting:
David Benjamin:
The text was updated successfully, but these errors were encountered: