Mike Shaver (he/him) | VP Engineering | Toronto

To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/public/adcac44d-ed9e-4031-a8ef-53f0bcbd3e2en%40groups.cabforum.org.
|
You don't often get email from ma...@maria.cc.
Learn why this is important
|
--
You received this message because you are subscribed to the Google Groups "Public (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@groups.cabforum.org.
OATI would be interested in participating in a client certificate working group as well.
Thanks,
Corey Rasmussen
Vice President & Chief Information Security Officer
Phone: 763.201.2000
Fax: 763.201.5333
Open Access Technology International, Inc.
7901 Computer Ave, Bloomington, MN 55435
CONFIDENTIAL INFORMATION: This email and any attachment(s) contain confidential and/or proprietary information of Open Access Technology International, Inc. Do not copy or distribute without the prior written consent of OATI. If you are not a named recipient to the message, please notify the sender immediately and do not retain the message in any form, printed or electronic.
From: 'Dustin Ward' via Public (CA/B Forum) [mailto:pub...@groups.cabforum.org]
Sent: Monday, March 9, 2026 1:20 PM
To: pub...@groups.cabforum.org
Subject: Re: [public] Re: Client authentication Working Group
{External email message: This email is from an external source. Please exercise caution prior to opening attachments, clicking on links, or providing any sensitive information.}
I would be interested in this as well.
Thanks,
Dustin Ward
Executive Vice President of Technology
SSL.com
From: Maria Merkel <ma...@maria.cc>
Sent: Monday, March 9, 2026 1:14:39 PM
To: Public (CA/B Forum) <pub...@groups.cabforum.org>
Cc: sven....@keyfactor.com <sven....@keyfactor.com>
Subject: [public] Re: Client authentication Working Group
|
You don't often get email from ma...@maria.cc. Learn why this is important |
I agree that it would be good to have a Working Group and Baseline Requirements for Client Authentication certificates.
I would participate in such a Working Group as an Interested Party if given the opportunity.
Maria Merkel
sven....@keyfactor.com schrieb am Montag, 9. März 2026 um 19:12:28 UTC+1:
Plus one for my interest in this.
Sven Rajala
Deputy PKI Officer
M: +1 540 687 0761
sven.rajala@keyfactor.com
All,
I'm trying to understand why we're encouraging this by looking to form a group for client authentication.
Client authentication with publicly-trusted certificates is bad. Let's not pretend otherwise.
Convenient, easy, and perhaps with a couple of decades of 'it just works’ behind it. I understand the impetus to keep it around, but shouldn't we as an industry be promoting and encouraging
actually secure, anti-fragile solutions instead?
Since CRP's (correct) deprecation, the key thing I've been asking users/customers/subscribers is: what are you authenticating? (Or at least, what do you
think you’re authenticating).
As Mark pointed out, and in my experience - the answer is nothing. The DN is almost checked, not that it practically could be.
Doing some kind of pinning or serial-number checking requires a user to login and upload their cert first, negating the point of using an externally-issued certificate. Even then, there's no guarantee of uniqueness across CAs.
We know pinning is fragile and is something all good CAs openly discourage.
We should all understand the way certs work for TLS and that for each connection the client is actively verifying the connection address with the details in the certificate. Client authentication from publicly-trusted CAs does none of that, relying on 'well, it got verified when it was issued, so that should be good enough'.
Again, I agree with Mark that this is all security theatre and that we should do what we can to ensure everyone is on the same page, especially subscribers.
The absolute *best* case here is the authenticating party is able to confirm that the client...has an internet connection. That's it. That's the baseline. That isn't authentication at all.
I'd go so far as to say if you want to authenticating using certificates, you really haveto have issued them yourself. Millions of organisations do it today with device authentication to networks/wireless/VPNs - all from private CAs, because it'd be a huge risk to do otherwise.
Why are we considering trying to support what we know to be a highly insecure and inherently fragile solution? Is it purely out of
convenience? Money?
I fully understand the difficulty of migrating subscribers to a better, safer solution and I think CRP's move of their deadline reflects this. It doesn't mean it's time to carry on something we know is bad.
We should do better as a group, even if that means recommending more appropriate solutions that may not involve PKI.
nick
ACTALIS would also be interested in participating in a Client Certificate Working Group, should one be created.
Hi All,
This has been a really useful discussion.
I tend to agree that the core challenge here is not the EKU itself, but the semantics that relying parties assume from a publicly trusted client certificate. In many deployments the certificate ends up being treated as an identity assertion, when in reality the issuance process may not provide the level of identity assurance the relying party believes it does.
At the same time, client authentication via TLS is widely used today in enterprise environments, particularly for mTLS between services, devices, and APIs. In many of those deployments the organization issuing the certificate and the organization validating it are the same entity, which aligns with the private PKI model that Aaron and Nick describe.
Given that direction, it may be reasonable for publicly trusted WebPKI to continue focusing primarily on server authentication. If that is the intended long-term direction, however, it would be helpful for the ecosystem to have clarity and transition guidance. Many organizations currently rely on public CAs for client certificates, and moving those deployments to private PKI or alternative identity systems will take time and planning.
In the meantime, clearer guidance to relying parties on what assurance a publicly issued client authentication certificate actually provides and what it does not could be valuable. A number of systems implicitly assume stronger identity guarantees than the issuance model necessarily supports.
Rather than a formal WG, we should consider whether the end result is a formal prohibition, a phase-out timeline, or simply clearer documentation, I think providing explicit direction would help reduce ambiguity for both implementers and relying parties.
Thanks again for raising the topic.
To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/public/5d1df1fa-b66e-48db-a28a-a700492c39ca%40staff.aruba.it.