💾 Archived View for bbs.geminispace.org › u › mozz › 1112 captured on 2023-11-04 at 15:34:44. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2023-09-28)

➡️ Next capture (2023-11-14)

🚧 View Differences

-=-=-=-=-=-=-

Comment by ☕️ mozz

Re: "hobby coder here with a question. When implementing client..."

In: s/Gemini

the certificate is signed -> the certificate cannot be generated without the owner's private key -> the certificate's hash cannot be generated without the owner's private key -> the certificate hash cannot be spoofed

☕️ mozz

2023-05-27 · 5 months ago

3 Later Comments ↓

🚀 skyjake

You may be interested in this thread where the same topic came up:

— /s/Bubble/149

🤖 alexlehm

I had a big problem convincing people on another project that the way client hashes are used are in fact secure (since I asked how to do that in a Java server). In the end it turned out to work quite well, I use that in my chat server

🍀 gritty

perfect, that's what I thought. thanks everyone!

Original Post

🌒 s/Gemini

hobby coder here with a question. When implementing client authentication, do we just store the tls client hash? If so how is this not able to be spoofed? I'm guessing there is some public key authentication going on in the background. looking at the spec and some searches only helped a little.

💬 gritty · 4 comments · 2023-05-27 · 5 months ago · #certificates #client_certificates #programming