Open aochagavia opened 3 weeks ago
By the way, a more precise definition could be found in RFC 7589 about NETCONF over TLS, which uses server and client certificates for authentication. Here's the relevant excerpt:
The peer acting as the NETCONF client MUST act as the TLS client. The TLS client actively opens the TLS connection and the TLS server passively listens for the incoming TLS connections. The well-known TCP port number 6513 is used by NETCONF servers to listen for TCP connections established by NETCONF over TLS clients. The TLS client MUST send the TLS ClientHello message to begin the TLS handshake. The TLS server MUST send a CertificateRequest in order to request a certificate from the TLS client. Once the TLS handshake has finished, the client and the server MAY begin to exchange NETCONF messages. Client and server identity verification is done before the NETCONF
message is sent. This means that the identity verification is completed before the NETCONF session is started.
There's also section 7, specifying how the client's identity should be validated (it's too long to quote here).
Relevant text:
I think it makes sense to have a single section, as follows: