Mike Shaver (he/him) | VP Engineering | Toronto

To view this discussion visit https://groups.google.com/a/groups.cabforum.org/d/msgid/public/adcac44d-ed9e-4031-a8ef-53f0bcbd3e2en%40groups.cabforum.org.
|
You don't often get email from ma...@maria.cc.
Learn why this is important
|
--
You received this message because you are subscribed to the Google Groups "Public (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@groups.cabforum.org.
OATI would be interested in participating in a client certificate working group as well.
Thanks,
Corey Rasmussen
Vice President & Chief Information Security Officer
Phone: 763.201.2000
Fax: 763.201.5333
Open Access Technology International, Inc.
7901 Computer Ave, Bloomington, MN 55435
CONFIDENTIAL INFORMATION: This email and any attachment(s) contain confidential and/or proprietary information of Open Access Technology International, Inc. Do not copy or distribute without the prior written consent of OATI. If you are not a named recipient to the message, please notify the sender immediately and do not retain the message in any form, printed or electronic.
From: 'Dustin Ward' via Public (CA/B Forum) [mailto:pub...@groups.cabforum.org]
Sent: Monday, March 9, 2026 1:20 PM
To: pub...@groups.cabforum.org
Subject: Re: [public] Re: Client authentication Working Group
{External email message: This email is from an external source. Please exercise caution prior to opening attachments, clicking on links, or providing any sensitive information.}
I would be interested in this as well.
Thanks,
Dustin Ward
Executive Vice President of Technology
SSL.com
From: Maria Merkel <ma...@maria.cc>
Sent: Monday, March 9, 2026 1:14:39 PM
To: Public (CA/B Forum) <pub...@groups.cabforum.org>
Cc: sven....@keyfactor.com <sven....@keyfactor.com>
Subject: [public] Re: Client authentication Working Group
|
You don't often get email from ma...@maria.cc. Learn why this is important |
I agree that it would be good to have a Working Group and Baseline Requirements for Client Authentication certificates.
I would participate in such a Working Group as an Interested Party if given the opportunity.
Maria Merkel
sven....@keyfactor.com schrieb am Montag, 9. März 2026 um 19:12:28 UTC+1:
Plus one for my interest in this.
Sven Rajala
Deputy PKI Officer
M: +1 540 687 0761
sven.rajala@keyfactor.com
All,
I'm trying to understand why we're encouraging this by looking to form a group for client authentication.
Client authentication with publicly-trusted certificates is bad. Let's not pretend otherwise.
Convenient, easy, and perhaps with a couple of decades of 'it just works’ behind it. I understand the impetus to keep it around, but shouldn't we as an industry be promoting and encouraging
actually secure, anti-fragile solutions instead?
Since CRP's (correct) deprecation, the key thing I've been asking users/customers/subscribers is: what are you authenticating? (Or at least, what do you
think you’re authenticating).
As Mark pointed out, and in my experience - the answer is nothing. The DN is almost checked, not that it practically could be.
Doing some kind of pinning or serial-number checking requires a user to login and upload their cert first, negating the point of using an externally-issued certificate. Even then, there's no guarantee of uniqueness across CAs.
We know pinning is fragile and is something all good CAs openly discourage.
We should all understand the way certs work for TLS and that for each connection the client is actively verifying the connection address with the details in the certificate. Client authentication from publicly-trusted CAs does none of that, relying on 'well, it got verified when it was issued, so that should be good enough'.
Again, I agree with Mark that this is all security theatre and that we should do what we can to ensure everyone is on the same page, especially subscribers.
The absolute *best* case here is the authenticating party is able to confirm that the client...has an internet connection. That's it. That's the baseline. That isn't authentication at all.
I'd go so far as to say if you want to authenticating using certificates, you really haveto have issued them yourself. Millions of organisations do it today with device authentication to networks/wireless/VPNs - all from private CAs, because it'd be a huge risk to do otherwise.
Why are we considering trying to support what we know to be a highly insecure and inherently fragile solution? Is it purely out of
convenience? Money?
I fully understand the difficulty of migrating subscribers to a better, safer solution and I think CRP's move of their deadline reflects this. It doesn't mean it's time to carry on something we know is bad.
We should do better as a group, even if that means recommending more appropriate solutions that may not involve PKI.
nick
ACTALIS would also be interested in participating in a Client Certificate Working Group, should one be created.