Is it important for the client to know, from the TLS stack itself, whether 
client authentication succeeded or not? My assumption (perhaps incorrect) has 
been that it is the server that cares about the client's identity (or 
identities) in order to make an authorization decision.

This thread also seems to consider client authentication a binary state: the 
client is either authenticated, or not. In practice, the client may assert 
multiple identities, and the server may grant various levels of access.

Also, why should the client care whether session ticket X includes client 
identity Y? If a client resumes a TLS session with a session ticket that does 
not include (or point to) a client authenticator needed to satisfy the client's 
request, the server can initiate client auth (or deny the request).

Cheers,

Andrei

From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of David Wong
Sent: Tuesday, February 14, 2017 8:18 AM
To: David Benjamin <david...@chromium.org>
Cc: Cas Cremers <cas.crem...@cs.ox.ac.uk>; tls@ietf.org
Subject: Re: [TLS] Awkward Handshake: Possible mismatch of client/server view 
on client authentication in post-handshake mode in Revision 18




On Feb 14 2017, at 4:44 pm, David Benjamin 
<david...@chromium.org<mailto:david...@chromium.org>> wrote:
NewSessionTicket always includes in-handshake client auth. The resumption 
secret can't even be derived without it.


Oups, my bad. What about if the client do send a certificate, but the server 
decides not to accept it, but goes on with the connection (I think nothing in 
the spec says that the server needs to terminate the connection if the client 
cert is not good).
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to