I mean the cert that the ORIGINAL client presented to the proxy.

From: Rifaat Shekh-Yusef <rifaat.i...@gmail.com>
Date: Tuesday, October 29, 2019 at 7:57 AM
To: Rich Salz <rs...@akamai.com>
Cc: Neil Madden <neil.mad...@forgerock.com>, Brian Campbell 
<bcampbell=40pingidentity....@dmarc.ietf.org>, oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] client certs and TLS Terminating Reverse Proxies (was 
Re: I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt)

Maybe I misunderstood what you meant by "client-cert". If you meant the proxy 
client certificate, then that is obviously not enough. You seem to suggest that 
you meant the remote client certificate to be installed on the proxy to be used 
with the backend system; if this is the case, then this would work and you 
would not need the signature, but the issue I see with this approach is that 
you need to reconfigure the proxy every time you change the client certificate, 
which is not practical if the certificate is short lived.

Regards,
 Rifaat


On Mon, Oct 28, 2019 at 2:55 PM Salz, Rich 
<rs...@akamai.com<mailto:rs...@akamai.com>> wrote:

  *   To avoid the misconfiguration issue Neil raised, you probably need both: 
a client-cert and a signature over the certificate being forwarded,

I am not so sure.  One can argue that transport-level identity should be 
secured by transport-level.  But installing a client certificate on a reverse 
proxy can be difficult.  (Not if the reverse proxy is a CDN, of course :) And I 
don’t see how having both prevents misconfiguration, but that might be my fault.


  *   This could still be achieve by extending RFC7239 with new parameter(s).

I have no opinion on this part of it.

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to