Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scope of server USE_CERTIFICATE frames is unclear #1092

Closed
davidben opened this issue Mar 3, 2020 · 1 comment
Closed

Scope of server USE_CERTIFICATE frames is unclear #1092

davidben opened this issue Mar 3, 2020 · 1 comment

Comments

@davidben
Copy link
Contributor

davidben commented Mar 3, 2020

All the examples of server USE_CERTIFICATE frames show them applying to stream 0, which I guess means they ambiently apply to the entire connection, but there isn't clear specification text describing this. The draft in general does not clearly specify the semantics and timing of a USE_CERTIFICATE frame, only alluding to problems in security considerations. (Incidentally, that section is missing an RFC6919 citation. ;-) )

Questions of server certificate scope need to further consider whether HTTP authentication is simply a property of the Host header and being willing to respond to the name, or whether the exact server certificate is relevant. In particular, it's unclear how this interacts with the tls-server-end-point channel binding, especially if the draft does not try to bind server certificates to streams. (Note that, if you do decide to bind them, the binding needs to be set before the request is sent, which makes the timing is quite different from client certificates.)

@mnot
Copy link
Member

mnot commented Jul 29, 2021

Closing, as we're no longer working on secondary certs.

@mnot mnot closed this as completed Jul 29, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

2 participants