Just replying on one thing...

On Thu, Apr 12, 2018 at 10:03:11AM +0100, Neil Madden wrote:
> Hi Brian,
> 
> Thanks for the detailed responses. Comments in line below (marked with ***).
> 
> Neil
> 
> > On Wednesday, Apr 11, 2018 at 9:47 pm, Brian Campbell 
> > <bcampb...@pingidentity.com (mailto:bcampb...@pingidentity.com)> wrote:
> > On Thu, Mar 29, 2018 at 9:18 AM, Neil Madden <neil.mad...@forgerock.com 
> > (mailto:neil.mad...@forgerock.com)> wrote:
> > > 10. The PKI client authentication method 
> > > (https://tools.ietf.org/html/draft-ietf-oauth-mtls-07#section-2.1) makes 
> > > no mention at all of certificate revocation and how to handle checking 
> > > for that (CRLs, OCSP - with stapling?). Neither does the Security 
> > > Considerations. If this is a detail to be agreed between then AS and the 
> > > CA (or just left up to the AS TLS stack) then that should perhaps be made 
> > > explicit. Again, there are privacy considerations with some of these 
> > > mechanisms, as OCSP requests are typically sent in the clear (plain HTTP) 
> > > and so allow an observer to see which clients are connecting to which AS.
> >
> > I didn't think that a TLS client could do OCSP stapling?
> >
> > *** I think you are right about this. I always assumed it was symmetric 
> > (and I think it technically could work), but the spec only talks about 
> > stapling in the server-side of the handshake.

This changed between TLS 1.2 and TLS 1.3 -- in 1.3, the server can
include "status_request" in its CertificateRequest, and the
extensions block in the client's Certificate message can include the
OCSP staple.

-Ben

Attachment: signature.asc
Description: PGP signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to