Skip to main content

Questions tagged [mtls]

1 vote
1 answer
75 views

I am working for a company and we are investigating how mTLS should work. Since public ca's won't issue in the nearby future the client auth EKU, we have to look for alternatives. When searching on ...
J. Doe's user avatar
  • 115
0 votes
2 answers
132 views

I am working for a company who has to change the current mTLS setup because public CA's won't issue the client auth extension anymore, which is required to setup mTLS. We are currently demanding from ...
J. Doe's user avatar
  • 115
4 votes
1 answer
2k views

In a typical phishing scenario where a user sends their credentials to a malicious 3rd party server (Attacker) instead of the intended server (e.g. Microsoft) by accident, how does Certificate-Based ...
DDSK's user avatar
  • 51
0 votes
2 answers
324 views

A third party supplier of an mTLS protected service gave us the following requirement: We were to obtain & share with them a client authentication certificate so their service can authenticate us ...
JohnLBevan's user avatar
0 votes
2 answers
231 views

Consider this scenario in an HTTPS (m)TLS [*] request: A trusted client sends a select query (the request) to a read-only database server The server uses a self-signed certificate, so it is ...
SOFe's user avatar
  • 133
1 vote
1 answer
369 views

TL;DR: I want to forward-chain client certificates by including their successor public key as an extension. See Questions. I am thinking about using client-side certificates in TLS (mTLS) as a more ...
Karsten's user avatar
  • 11
1 vote
1 answer
284 views

I have build multiple embedded devices with TLS1.2/3 + PSK using mbedtls and wolfssl libraries. My products have been with microcontrollers(ESP32, Silicon labs, etc.) and OpenWRT based Linux products. ...
Prajosh Premdas's user avatar
1 vote
1 answer
165 views

is it possible to revoke certificates manually without presenting the client certificate? i.e. provide certificate id only? technically in the certificates db maintained by the CA, each entry has its ...
DayDayDay's user avatar
4 votes
1 answer
981 views

Suppose that I have a reverse proxy such as caddy or Traefik that requires a client certificate to authenticate via mTLS, globally across reverse proxy. What is the attack surface for services behind ...
Brian's user avatar
  • 43
2 votes
0 answers
185 views

I`m working on a project for improving security of IoT devices by using per device X.509 certificate for authentication. The company uses IoT sensors, created inhouse, to gather data for analytics. ...
Zapo's user avatar
  • 21
3 votes
1 answer
1k views

I wonder what are the benefits of using mTLS for verifying clients when we have an API Key being sent over HTTPS. I am thinking on backend to backend communications, where one server needs to fetch ...
mFeinstein's user avatar