Mutual authentication: injective agreement vs implicit agreement properties

Hi, I'm currently reading up on a handshake protocol that supposedly provides mutual authentication.

While looking at an analysis of the protocol, I found two different types/flavors of mutual auth, an injective agreement and an implicit agreement.

THe first injective agreement is defined like this:

>Informally, injective agreement guarantees to an initiator I that whenever I completes a run ostensibly with a responder R, then R has been engaged in the protocol as a responder, and this run of I corresponds to a unique run of R. In addition, the property guarantees to I that the two parties agree on a set S of parameters associated with the run, including, in particular, the session key material Z.

This is pretty understandable to me. If I does a run, then I can be sure that R has completed a corresponding run, and can be sure that they have agrreed on the same session keys.

And then implicit agreement, which should be a weaker property sounds like this;:

>We use the term implicit in this context to denote that a party A assumes that any other party B who knows the session key material Z must be the intended party, and that B (if honest) will also agree on a set S of parameters computed by the protocol, one of which is Z. When implicit agreement holds for both roles, upon completion, A is guaranteed that A has been or is engaged in exactly one protocol run with B in the opposite role, and that B has been or will be able to agree on S. The main difference from injective agreement is that A concludes that if A sends the last message and this reaches B,then A and B have agreed on I, R and S.

This is a bit more wishy-washy to me. And to me, these two defintions sound pretty similar.

Can anyone, maybe in a pedagogical manner, sum up what the actual difference between two properties like this is? They sound very similar to me

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/GarseBo
πŸ“…︎ Jan 09 2022
🚨︎ report
New Doc on Mutual Authentication /r/pomerium/comments/ryfq…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/alexfornuto
πŸ“…︎ Jan 07 2022
🚨︎ report
New Doc on Mutual Authentication

Mutual Authentication is a complex and deep subject in cyber security, but it’s also an important aspect of zero trust.

That’s why I wrote this doc, explaining the concept and several practical examples across different network layers and configurations: https://www.pomerium.com/docs/topics/mutual-auth.html

πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/alexfornuto
πŸ“…︎ Jan 07 2022
🚨︎ report
New Doc on Mutual Authentication /r/pomerium/comments/ryfq…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/alexfornuto
πŸ“…︎ Jan 07 2022
🚨︎ report
New Doc on Mutual Authentication /r/pomerium/comments/ryfq…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/alexfornuto
πŸ“…︎ Jan 07 2022
🚨︎ report
End-to-end encryption and mutual authentication for distributed applications. github.com/ockam-network/…
πŸ‘︎ 27
πŸ’¬︎
πŸ‘€︎ u/mwadhwa
πŸ“…︎ Nov 20 2021
🚨︎ report
A Kubernetes engineer's guide to mTLS Mutual authentication for fun and profit buoyant.io/mtls-guide/
πŸ‘︎ 23
πŸ’¬︎
πŸ‘€︎ u/digicat
πŸ“…︎ Aug 28 2021
🚨︎ report
Mutual TLS Authentication prior to basic authentication

Hi. I'm presently doing some research which requires that assess the capabilities of the F5 platform. Let's say a requirement has been presented that an application accessing a resource behind the F5 (which requires authentication) must be accessed via the F5 which in it's own right requires TLS authentication.
Does the F5 platform have a feature which could be used to say offload the secondary authentication onto the platform itself? So once the application has successfully authenticated itself the F5, functioning as a reverse proxy would perform the basic authentication (in this case) to the protected resource?
Thanks in advance for any insight you can share.

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/erroluneal
πŸ“…︎ Jun 15 2021
🚨︎ report
Azure Apim Mutual Certificate authentication

can azure apim mutual certificate authentication/ two way ssl. there is an entry in the documentation for this ( api-management-howto-mutual-certificates) whose page title (Secure backend services using client certificate authentication in Azure API Management) and content looks like client certificat authentication/one way ssl to me. In my current setup there is an apim that provides a whole series of APIs. Most of the apis use different authentication methods and must continue to do so. And in the future, another api is to be secured via two way ssl. Therefore the question, is it possible to secure an api via two way ssl? If it is possible, the second question is, is it also possible to secure only one of the apis via this without affecting the rest of the apis?

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/Jfumf
πŸ“…︎ Apr 08 2021
🚨︎ report
CATKeys - drop in replacement for Node's `https` and `tls` for mutual authentication. So only authenticated clients can communicate with a HTTPS or TLS server github.com/93million/catk…
πŸ‘︎ 16
πŸ’¬︎
πŸ‘€︎ u/pommymac
πŸ“…︎ Feb 11 2021
🚨︎ report
A little info on implementing mutual TLS (client certificate authentication) in the Shortcuts app

Targeting Post: here

I wanted to post a comment, but unfortunately, it was archived. So I thought I could make a new post here to comment on it indirectly.

A little intro:

Hey u/primalmotion, u/benegrunt. It's been 9 months since you guys tried to work on the client certificate thingy. I don't know if you guys managed to solve the problem eventually or not, but here's some light that will maybe help you.

First thing first, okay, so... Apparently, there is currently no way to make mutual TLS (client certificate auth) work natively in shortcut without the aid of a third-party app.

As Apple said:

>In iOS, apps have access to a single keychain (which logically encompasses the iCloud keychain). This keychain is automatically unlocked when the user unlocks the device and then locked when the device is locked. An app can access only its own keychain items, or those shared with a group to which the app belongs. It can't manage the keychain container itself.

It's saddening to know that only certain Apple-provided apps like Safari, Mail can access the certificate profile, keychain, etc. Even though that Shortcuts is an Apple-provided app too. 0_0

I tried to use the Shortcuts app to import the certificate directly into its keychain, but oh boy did it worked out. I couldn't find a way to let Shortcuts import the cert itself, so nope...

For now, to have mutual TLS work on your phone you must build an app yourself.

Check out the info from Apple Technical Q&A 1745:

>To use digital identities in your apps, you will need to write code to import them. This typically means reading in a PKCS#12-formatted blob and then importing the contents of the blob into the app's keychain using the function SecPKCS12Import.
>
>This way, your new keychain items are created with your app's keychain access group.

Well...

So... you have to build your iOS app to handle the certificate challenge directly.

After an infinity amount of trials & errors, and checking countless Stack Overflow posts. I finally got it working, well somehow, duh.

To make it simple, I have to build an iOS app with custom intents defined. Inside the app, I have a function to get and import the certificate, then using AF.request from the Alamofire module to handle the certificate chal

... keep reading on reddit ➑

πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/PineappleEarly
πŸ“…︎ Mar 15 2021
🚨︎ report
KMS for mutual authentication

A client has a requirement for mutual authentication from a Lambda to their server and have stated the private key must be stored in KMS. However I'm not sure how this will work I could encrypt message using KMS but I feel like I'm missing something.

πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/PotisTemor
πŸ“…︎ Nov 01 2020
🚨︎ report
Mutual TLS Authentication vs. Client Cert Passthrough

Curious if anyone has thoughts/opinion:

If you enable client cert passthrough at a load balancer, would that be considered enabling mutual authentication? Or does mutual TLS authentication imply that the certificate is verified in some way by the load balancer?

Appreciate your thoughts ...

πŸ‘︎ 23
πŸ’¬︎
πŸ‘€︎ u/chazdecker
πŸ“…︎ Sep 30 2020
🚨︎ report
We’ve released version 1.5 of the HAProxy Kubernetes Ingress Controller. This version adds the following: External Ingress Controller, Service Mutual TLS Authentication, Basic Authentication, Config Snippet Support. Read more in this blog post. haproxy.com/blog/announci…
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/TeamHAProxy
πŸ“…︎ Jan 21 2021
🚨︎ report
Mutual TLS authentication with relayd(8) TLS server

Hello, everyone.

I'm trying out OpenBSD for a personal remote server, since I've been wanting to fiddle with it for quite some time now.

I'm using httpd(8) as an HTTP server listening on 127.0.0.1:8080 and serving a directory of static content. In front of it, I'm running relayd(8) to handle TLS termination and adding some cache related HTTP headers and also some of the OWASP security headers.

I want to enable mutual TLS authentication (also known as client CA validation) for this HTTP server. I know this is supported by httpd(8) through the the tls client_ca option, but I can't seem to find a straightforward way to do this with relayd(8). Can anyone who experienced this issue before share some pointers?

I'm sorry if I missed anything obvious.

Thanks in advance.

πŸ‘︎ 7
πŸ’¬︎
πŸ‘€︎ u/_Kastor
πŸ“…︎ Sep 23 2020
🚨︎ report
Enable Mutual TLS Authentication Between Your Kubernetes Workloads Using Istio medium.com/better-program…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/alwaysblearnin
πŸ“…︎ May 14 2020
🚨︎ report
Mutual TLS authentication in REST services with Kotlin

Do you want to develop mutual TLS Web services in Kotlin? Hexagon 1.2 got released today with that feature, check the following section to learn how: https://hexagonkt.com/port_http_server/#https

You can check all project's examples and source code at GitHub : https://github.com/hexagonkt

If you give it a go, please share your feedback!

Disclaimer: I'm the project's maintainer

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/jaguililla
πŸ“…︎ Jan 17 2020
🚨︎ report
Mutual authentication got javax.net.ssl.SSLHandshakeException: null cert chain in Spring Boot

Anyone has any experience configuring Mutual Authentication? Please help.

Here the link: stackoverflow

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/cuhabaho
πŸ“…︎ Jan 23 2020
🚨︎ report
Mutual funds cannot use Aadhaar-based authentication (Mint)

Last week, on 12 October, the Unique Identification Authority of India (UIDAI) wrote to the mutual funds industryβ€”the registrar and transfer agents (R&T) and some online distributorsβ€”asking them to discontinue using Aadhaar-based authentication to complete the Know Your Client (KYC) norms. Mint has a copy of the letter.

UIDAI has said that the said firms will have to confirm in writing that they have closed the Aadhaar-based authentication and enumerate an exit plan by 20 October. N.S. Venkatesh, chief executive officer, Association of Mutual Funds of India (Amfi; the MF industry’s trade body) told Mint that they will β€œsoon meet all the stakeholders, including fund houses and R&Ts and come up with an alternative.”

More: https://www.livemint.com/Money/Pbwy2hDq5NHDC2ki9s4voL/Mutual-funds-cannot-use-Aadhaarbased-authentication.html

πŸ‘︎ 28
πŸ’¬︎
πŸ‘€︎ u/routefire
πŸ“…︎ Oct 17 2018
🚨︎ report
Mutual authentication in a Webservice on .NET Framework 4.0

Hi

I have been tasked to look into, to figure out how to use mutual authentication in a existing webservice application running on .NET Framework 4, so I am just writing here to figure out what my options is.

Currently it works such, that another internal service calls this webservice, which then make a XML file and then makes a HTTP POST request to a external API through an proxy using the HttpWebRequest class. These request have until now been "authenticated" by tunneling through VPN. But since the application will be migrated to a new server setup where VPN will not be used, implementing mutual authentication will be necessary.

What I have gathered about HttpWebRequest, it seems that it does not support a validation check on server certificates in .NET 4.0. Is this correct?

Another option I have explored is using a combination of SslStream and TcpClient to obtain this goal. There are some good examples on SO and CodeProject, so this looks like a viable solution.

The last option would be to refactor the solution to use a newer framework, however this is the least preferred option since we are only talking about a migration to a new server setup. However we are open to this possibility

So what do you guys think?

πŸ‘︎ 10
πŸ’¬︎
πŸ‘€︎ u/poulsky
πŸ“…︎ Nov 26 2018
🚨︎ report
Provisioning ESP32 devices for mutual TLS authentication with MQTT broker using own PKI youtube.com/watch?v=7qTT9…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/aharizma
πŸ“…︎ Jun 27 2019
🚨︎ report
Details on Golang mutual TLS authentication vulnerability CVE-2018-16875 apisecurity.io/mutual-tls…
πŸ‘︎ 13
πŸ’¬︎
πŸ‘€︎ u/DSotnikov
πŸ“…︎ Dec 19 2018
🚨︎ report
Configuring Certificate-Based Mutual Authentication with Kubernetes Ingress-Nginx medium.com/@awkwardferny/…
πŸ‘︎ 17
πŸ’¬︎
πŸ‘€︎ u/awkwardferny
πŸ“…︎ Nov 07 2018
🚨︎ report
Details on CVE-2018-16875 (mutual TLS authentication vulnerability fixed this week) apisecurity.io/mutual-tls…
πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/DSotnikov
πŸ“…︎ Dec 19 2018
🚨︎ report
Mutual authentication with traefik

Hi All

I was thinking about using mutual authentication to block unauthorized access to my applications on my server.

I am using traefik running in docker as my reverse proxy. Apparently traefik supports mutual authentication.

Is this a good idea security wise? How would I configure this?

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/N4KA
πŸ“…︎ Nov 17 2018
🚨︎ report
Trevor Perrin's Noise Protocol Framework: Noise is a framework for building crypto protocols. Noise protocols support mutual and optional authentication, identity hiding, forward secrecy, zero round-trip encryption, and other advanced features. noiseprotocol.org/
πŸ‘︎ 25
πŸ’¬︎
πŸ‘€︎ u/johnmountain
πŸ“…︎ Apr 20 2016
🚨︎ report
Certificate based Mutual Authentication

I am trying to find some guidance on mutual authentication on certificate requirements for TLS based mutual authentication. My understand is that if you are allowing a connection from and outside organization they need to present a certificate that identifies themselves. Does it matter who creates the certificates? Can organization A create a certificate for organization B to present?

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/lepenguin
πŸ“…︎ Mar 12 2019
🚨︎ report
wolfeidau/golang-massl: a simple mutual authentication example using TLS certificates github.com/wolfeidau/gola…
πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/dgryski
πŸ“…︎ Mar 03 2018
🚨︎ report
Mutual Funds Cannot Use Aadhaar-based Authentication livemint.com/Money/Pbwy2h…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/Private_Resident
πŸ“…︎ Oct 16 2018
🚨︎ report
πŸ•― Orpheus' Lyre mutual authentication validation bypass samba.org/samba/security/…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/based2
πŸ“…︎ Jul 14 2017
🚨︎ report
Mutual TLS authentication in Go levigross.com/2015/11/21/…
πŸ‘︎ 29
πŸ’¬︎
πŸ‘€︎ u/levigross
πŸ“…︎ Nov 23 2015
🚨︎ report
Question about SSL Mutual Authentication

I'm having a small problem:

I'm trying to communicate with a https server that requires a client certificate. According to the TLS RFC, the server has to send a CertificateRequest message containing the acceptable client certificate CA Names. This server doesnt send this list though, so my Java client cannot select the correct certificate from its keystore. My question is, according to the standard, does the Server HAVE to send this list or is it optional? The RFC is a little badly worded in that regard.

πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/Isek
πŸ“…︎ Jun 29 2015
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.