mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 13:36:02 +03:00
[GH-ISSUE #273] Client certs also specify Server usage #177
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#177
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @travisgroth on GitHub (Jun 29, 2020).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/273
Using the
-clientflag results in a certificate valid for both Client and Server usage. This can lead to some unexpected validation scenarios. I think they should be mutually exclusive in practice.@FiloSottile commented on GitHub (Oct 25, 2020):
mTLS certificates are often used for both the client and server sides. What's a use case where the extra serverAuth usage is a problem rather than just superfluous?
@travisgroth commented on GitHub (Oct 25, 2020):
If you're using mkcert for test certificates, you can unintentionally write code that is only validating the client certificate against Server usage, and looks correct until faced with real world client-only certs. This is the scenario I encountered.
I'm not sure I've directly seen any client certs also marked for server usage, but you are correct; that probably happens in mTLS services that aren't on the edge of a system. Maybe it's best to have additional control over both usages. The least surprising behavior would probably be:
--clientand--server@moparisthebest commented on GitHub (Mar 24, 2022):
The real issue is that server certs should set client usage too, to match LetsEncrypt (and most other CAs ?)