Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

Scheduled Pinned Locked Moved Uncategorized
7 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mhoye@cosocial.caM This user is from outside of this forum
    mhoye@cosocial.caM This user is from outside of this forum
    mhoye@cosocial.ca
    wrote last edited by
    #1

    Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

    I mean "get the page at all", not "have a fallback option" or "see a warning".

    I mean for people with A installed they it's a normal website and for people without A it's completely inaccessible.

    owen@mastodon.transneptune.netO hallvors@oslo.townH petko@social.petko.meP tindrasgrove@infosec.exchangeT 5 Replies Last reply
    0
    • mhoye@cosocial.caM mhoye@cosocial.ca

      Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

      I mean "get the page at all", not "have a fallback option" or "see a warning".

      I mean for people with A installed they it's a normal website and for people without A it's completely inaccessible.

      owen@mastodon.transneptune.netO This user is from outside of this forum
      owen@mastodon.transneptune.netO This user is from outside of this forum
      owen@mastodon.transneptune.net
      wrote last edited by
      #2

      @mhoye _Specifically_ that the client must be manually configured to trust the issuer? Not in any commonly-deployed configuration I'm aware of, no. TLS implementations tend to make very little distinction between system, managed, and user-provided trust roots.

      1 Reply Last reply
      0
      • mhoye@cosocial.caM mhoye@cosocial.ca

        Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

        I mean "get the page at all", not "have a fallback option" or "see a warning".

        I mean for people with A installed they it's a normal website and for people without A it's completely inaccessible.

        hallvors@oslo.townH This user is from outside of this forum
        hallvors@oslo.townH This user is from outside of this forum
        hallvors@oslo.town
        wrote last edited by
        #3

        @mhoye I suppose https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Strict-Transport-Security will be a possible solution.

        1 Reply Last reply
        0
        • mhoye@cosocial.caM mhoye@cosocial.ca

          Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

          I mean "get the page at all", not "have a fallback option" or "see a warning".

          I mean for people with A installed they it's a normal website and for people without A it's completely inaccessible.

          owen@mastodon.transneptune.netO This user is from outside of this forum
          owen@mastodon.transneptune.netO This user is from outside of this forum
          owen@mastodon.transneptune.net
          wrote last edited by
          #4

          @mhoye You could get partway to what it seems like you want by having W require a _client_ certificate, signed by A, for any TLS connection, but then you have to provision client certs for each client - not just configure them to trust A.

          1 Reply Last reply
          0
          • mhoye@cosocial.caM mhoye@cosocial.ca

            Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

            I mean "get the page at all", not "have a fallback option" or "see a warning".

            I mean for people with A installed they it's a normal website and for people without A it's completely inaccessible.

            petko@social.petko.meP This user is from outside of this forum
            petko@social.petko.meP This user is from outside of this forum
            petko@social.petko.me
            wrote last edited by
            #5

            @mhoye closest thing I've ever seen is in Radius, where the Radius *server* gets a TLS Alert "bad certificate" whenever a client fails to connect to it due to a failure in the server cert validation.

            Maybe TLS Alert is a good keyword to look into (http://www2.gnutls.org/manual/html_node/The-TLS-Alert-Protocol.html)

            petko@social.petko.meP 1 Reply Last reply
            0
            • petko@social.petko.meP petko@social.petko.me

              @mhoye closest thing I've ever seen is in Radius, where the Radius *server* gets a TLS Alert "bad certificate" whenever a client fails to connect to it due to a failure in the server cert validation.

              Maybe TLS Alert is a good keyword to look into (http://www2.gnutls.org/manual/html_node/The-TLS-Alert-Protocol.html)

              petko@social.petko.meP This user is from outside of this forum
              petko@social.petko.meP This user is from outside of this forum
              petko@social.petko.me
              wrote last edited by
              #6

              @mhoye yeah... nginx does not provide a variable with a server cert verification error, apache doesn't seem to have any similar tool as well.

              Also thinking about this, if a client trusts the server cert directly without having the CA cert installed, it wouldn't send a TLS alert. The connection will just succeed.

              If you're going to be installing a custom cert on the clients, you might as well make it a client cert. This has the benefit of using a tried and tested authentication method.

              1 Reply Last reply
              0
              • mhoye@cosocial.caM mhoye@cosocial.ca

                Lazyweb, a question: if (1) run a certificate authority let's call A, and a web server W, is there a way for me to say that a client C must have A manually installed as trusted CA in order to get a web page from W?

                I mean "get the page at all", not "have a fallback option" or "see a warning".

                I mean for people with A installed they it's a normal website and for people without A it's completely inaccessible.

                tindrasgrove@infosec.exchangeT This user is from outside of this forum
                tindrasgrove@infosec.exchangeT This user is from outside of this forum
                tindrasgrove@infosec.exchange
                wrote last edited by
                #7

                @mhoye it sounds like you’re looking for mutual authentication? https://en.wikipedia.org/wiki/Mutual_authentication

                1 Reply Last reply
                1
                0
                • R relay@relay.infosec.exchange shared this topic
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups