[TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-09 Thread Mohit Sahni
sponse to the server indicating that client has a CT log along with the log. Server can enforce both CT and Revocation checks at the same time. Please let me know your opinion on this and do you think there is some merit to standardize this. Thanks for paying attention to my email.

Re: [TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-10 Thread Mohit Sahni
20 PM Ryan Sleevi wrote: > > > > On Sun, May 9, 2021 at 1:14 PM Mohit Sahni wrote: >> >> Hello TLS WG, >> >> RFC6962 only talks about support of CT to verify the server >> certificates, however while working on zero trust services that >> require MTLS for

Re: [TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-10 Thread Mohit Sahni
Hi Melinda and Rich, Thank for your comments, I agree that there is not much demand from the enterprise PKI but with the rise of IOT devices and automatic enrollment for client certificates, a need for some auditing of all the issued client certificates is becoming more important. Managing large se

Re: [TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-10 Thread Mohit Sahni
On Mon, May 10, 2021 at 8:41 AM Ryan Sleevi wrote: > > > > On Mon, May 10, 2021 at 9:43 AM Mohit Sahni wrote: >> >> Hi Ryan, >> Thanks for answering my question in a lot of detail. I asked this >> question in the context of a private PKI for client certif

Re: [TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-10 Thread Mohit Sahni
On Mon, May 10, 2021 at 1:14 PM Ryan Sleevi wrote: > > > > On Mon, May 10, 2021 at 3:23 PM Mohit Sahni wrote: >> >> On Mon, May 10, 2021 at 8:41 AM Ryan Sleevi wrote: >> > >> > >> > >> > On Mon, May 10, 2021 at 9:43 AM Mohit Sahn

Re: [TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-11 Thread Mohit Sahni
Internet-draft and get back to the group soon. Please feel free to share any other use cases you might have for validating CT for client certificates in MTLS connections. Regards, Mohit On Mon, May 10, 2021 at 6:55 PM Mohit Sahni wrote: > > On Mon, May 10, 2021 at 1:14 PM Ryan Sleevi

Re: [TLS] Certificate Transparency for Client certificate in MTLS handshake

2021-05-11 Thread Mohit Sahni
ates discoverable via DNS, for MTLS authentication > and object security use cases. This proposal could make your revocation > checks easier, and it's more performant than querying a hosted CT log. This > can also mitigate naming collisions that can occur when you allow multiple > roots

Re: [TLS] DTLS RRC and heartbeat

2021-10-21 Thread Mohit Sahni
Just want to highlight one more issue with using the original extension, many network security devices have threat signatures to identify the heartbeat extension in packet streams and they will block the sessions that match the signatures. On Thu, Oct 21, 2021 at 7:31 AM Hanno Böck wrote: > On T

Re: [TLS] OCSP in RFC7525bis

2022-01-19 Thread Mohit Sahni
Hi, > So for the new BCP, we have three options: > > Add a SHOULD-level requirement (for TLS 1.3 implementations, possibly also > TLS 1.2 implementations) to fail the handshake if the OCSP response is > missing or invalid. (As far as we can tell, RFC 8446 is silent on this.) > Remove the whole di