| ▲ | razakel 11 hours ago | ||||||||||||||||||||||||||||||||||||||||
Has anyone actually given a good explanation as to why TLS Client Auth is being removed? | |||||||||||||||||||||||||||||||||||||||||
| ▲ | dextercd 11 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
It's a requirement from the Chrome root program. This page is probably the best resource on why they want this: https://googlechrome.github.io/chromerootprogram/moving-forw... | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | singpolyma3 11 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
Because Google doesn't want anyone using PKI for anything but simple websites | |||||||||||||||||||||||||||||||||||||||||
| ▲ | cryptonector 11 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
One reason is that the client certificate with id-kp-clientAuth EKU and a dNSName SAN doesn't actually authenticate the client's FQDN. To do that you'd have to do something of a return routability check at the app layer where the server connects to the client by resolving its FQDN to check that it's the same client as on the other connection. I'm not sure how seriously to take that complaint, but it's something. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | greyface- 6 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
It competes with "Sign in with Google" SSO. | |||||||||||||||||||||||||||||||||||||||||