The same situation with the Windows TLS stack: we're not parsing status_request 
carried in the CertificateRequest message. There has not been a business 
case/request to support this for client certs.

Cheers,

Andrei

From: TLS <[email protected]> On Behalf Of David Benjamin
Sent: Friday, May 20, 2022 10:24 AM
To: Salz, Rich <[email protected]>
Cc: [email protected]
Subject: [EXTERNAL] Re: [TLS] Client programs and stapling?

Prior to TLS 1.3, it wasn't possible because the Certificate message didn't 
have extensions. Starting TLS 1.3, it looks like we did define status_request 
to be allowed in either direction. We (BoringSSL) never implemented the client 
certificate direction, since we haven't needed it yet. We just ignore the 
extension if we see it in CertificateRequest. At a glance, it looks like 
OpenSSL does the same. Dunno about other implementations.

On Fri, May 20, 2022 at 1:07 PM Salz, Rich 
<[email protected]<mailto:[email protected]>> wrote:
Do client programs staple a status when sending a cert to the server? It seems 
possible, someone just asked me if anyone does it.

_______________________________________________
TLS mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/tls<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftls&data=05%7C01%7CAndrei.Popov%40microsoft.com%7Cb4762a62317f4328c3dc08da3a858ee8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637886642965567650%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000%7C%7C%7C&sdata=ISc7UZjN175WKsIZatwEANK691ViWucPNbSFb5XlX9E%3D&reserved=0>
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to