TLS 1.3 Post-handshake authentication
arjan tijms
arjan.tijms at gmail.com
Thu Mar 4 22:09:05 UTC 2021
Hi,
On Thu, Mar 4, 2021 at 10:48 PM Xue-Lei Fan <xuelei.fan at oracle.com> wrote:
> <BCC jdk-dev, forward to security-dev>
>
> Hi Arjan,
>
> Did you have a chance to read RFC 8740? Post-Handshake authentication in
> HTTP/2 is not allowed for TLS 1.3. Is there a concern for the use case you
> mentioned?
>
Servlet supports both HTTP/1.1 and HTTP/2. The concern here is for
HTTP/1.1. We'll likely exclude client-cert for HTTP/2.
Kind regards,
Arjan Tijms
>
>
> Xuelei
> ------------------------------
> *From:* jdk-dev <jdk-dev-retn at openjdk.java.net> on behalf of arjan tijms <
> arjan.tijms at gmail.com>
> *Sent:* Thursday, March 4, 2021 12:57 PM
> *To:* jdk-dev at openjdk.java.net <jdk-dev at openjdk.java.net>
> *Subject:* TLS 1.3 Post-handshake authentication
>
> Hi,
>
> I noticed the following issue was recently closed:
>
> https://bugs.openjdk.java.net/browse/JDK-8206923
>
> For the Servlet spec this is however a very important feature, to the point
> that for the Servlet TCK we would need to explicitly allow vendors to use
> TLS 1.2 for the client-cert authentication mechanism test.
>
> Servlet needs this post-handshake authentication, since it allows the
> server to have protected/secured resources on a URL basis. During the
> handshake the URL that the client wishes to request is not yet available,
> so the server is unable to determine at that point whether it requires the
> client to present a certificate.
>
> Only when the request is being serviced can the server determine this, and
> respond with a certificate request. This however fails when using TLS 1.3,
> since it's not implemented in Java.
>
> The issue mentions that it might be implemented on request, so hereby I
> would like to request this.
>
> Kind regards,
> Arjan Tijms (Servlet spec committer)
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.openjdk.org/pipermail/security-dev/attachments/20210304/fd1c6307/attachment.htm>
More information about the security-dev
mailing list