Open bjhaid opened 2 years ago
Do you mean keymaster's CA cert as dowloaded from https://keymaster.example.com/public/x509ca. I dont understand te question (why would clients want this cert anyway?). Or if its something else can you explain an provide steps for reproducing?
@bjhaid Ping?
I dont understand te question (why would clients want this cert anyway?).
This certs need to be trusted on the clients machine to prevent the continuous prompts to manually trust the certificate. To prevent the CA from being used to issue a server cert that can MITM the user's traffic, the CA needs to explicitly indicate it is only used for signing clients certs and nothing more. As it is today the CA can be used to sign both server and client certificates.
@bjhaid what OS/browser combination are you seeing? The expected behavior (when using a browser) is:
Can you detail here the behaviour you are seeing? and what are you expecting?
the behavior I am seeing is:
That prompt shows up 4-5 times
When I had not trusted the server's CA I would get prompt number 2 every time I tried logging into keymaster/cloudgate. To prevent that from happening, rather than requiring every user to manually trust the cert we can instead distribute it to the users.
This will allow distributing the CA certificate to machines for trust and not worry about the certificate trusting servers. The certificate should probably have only the
ExtKeyUsageClientAuth
bit set