Many protocols use mutual authentication within TLS.
One such protocol is KMIP - Key Management Interoperability Protocol - see
https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=kmip
In KMIP mutual authentication at the TLS level is mandatory.

I don't get the rationale for Google wanting to basically ban any CA that
issues with an EKU for client authentication - but then the tendancy to be
very web-centric and the poor handling of client authentication within
browsers does lead to unfortunate decisions being made. It would also make
logical sense I assume (from a Google perspective) to remove client
authentication support entirely from the protocol.

Redefining that certificates that operate as a client inside TLS client
authentication to be packaged or presented as something other than what
they are also seems like the wrong way to solve this issue to me. Calling a
client a server for a specific context of usage does not seem like a
"solution".

Tim.
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to