On Sat, Nov 20, 2021 at 11:57:59AM +0000, John Mattsson wrote:

> - In some applications using mutually authenticated TLS, e.g., between
> nodes in 5G core networks or in mesh networks there is basically no
> difference between the client and the server. It would be very good if
> the document states that for such use cases the recommendations apply
> also for the client certificate.
There is always a difference between the client and server in any
context where a server is not dedicated to just a single known in
advance client.

That difference is that the client knows in advance which peer it wants
to connect to, and checks that that's the case.  While the server learns
an identity of the client that connected to it, but since it did not
expect any particular client, there is rarely such a thing as finding
the "wrong" identity on the client end of the connection.  The client is
simply (module key or CA compromise) hoever its certificate says it is.

Thus server identities are for session integrity, confidentiality, ...
while client identities are for authorisation.  The asymmetry is
fundamental, and "mutual TLS" does not create a symmetric role for
the client.

-- 
    Viktor.

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to