On 04/02/2022 19.24, Grant Edwards wrote:
The problem is _getting_ the client certificate that was provided
during the client/server handshake. That's trivial if the handshake
was successful. The problem is obtaining the client certificate when
the handshake fails. I was hoping there was a way to disable client
certificate validation so that the handshake will succeed and then
allow me to get the client certificate from the connection object.

FYI, it's more complicated in TLS 1.3. Post-handshake authentication (PHA) can happen out-of-bounce. Only TLS 1.2 performs client cert auth during handshake or renegotiation.

Christian
--
https://mail.python.org/mailman/listinfo/python-list

Reply via email to