Dear TLS Working Group,

 

I am writing to bring to your attention a potential security concern
regarding the exchange of client certificates during the TLS handshake
process. While the use of client certificates for authentication is a useful
security measure, it also presents a risk in terms of exposing sensitive
information contained within the certificate.

 

Currently, TLS requires the exchange of the DER-encoded client certificate
as part of the initial handshake process. This means that information such
as the client's name, email address, and other identifying details are
transmitted in cleartext, potentially allowing for interception and
exploitation by malicious actors.

 

I propose that a solution to this issue would be to separate the exchange of
client certificates from the initial handshake process, and instead require
the client to present their certificate only after the secure channel has
been established. This would allow for mutual authentication without
exposing sensitive information to potential interception.

 

I urge you to consider this proposal and take action to address this
potential security vulnerability. Thank you for your attention to this
matter.

 

Sincerely,

 

Yannick LaRue

SSE Carte à Puce Inc.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to