[Cryptography] On the deployment of client-side certs
Tony Arcieri
bascule at gmail.com
Tue Nov 15 16:27:07 EST 2016
On Mon, Nov 14, 2016 at 11:59 PM, Pieter Rogaar <pieter at rogaar.org> wrote:
>
> In today's threat models, there is also the metadata angle to consider.
> Client certificates are exchanged before the TLS connection is encrypted.
> Therefore, any information in the client certificate is sent in the clear.
Note this is true of TLS 1.2 and earlier, but in TLS 1.3 client
certificates are sent encrypted.
However, short of an origin-bound certificate approach, client certificates
still represent an SOP-violating linkable identifier, and are therefore
undesirable from a privacy perspective.
--
Tony Arcieri
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20161115/1cf554e6/attachment.html>
More information about the cryptography
mailing list