logoalt Hacker News

bawolffyesterday at 10:39 PM1 replyview on HN

Unless im missing something, this is a poor design full stop. How are they validating SAN on these client certificates?


Replies

agwayesterday at 10:54 PM

XMPP identifiers have domain names, so the XMPP server can check that the DNS SAN matches the domain name of the identifiers in incoming XMPP messages.

I've seen non-XMPP systems where you configure the DNS name to require in the client certificate.

It's possible to do this securely, but I agree entirely with your other comment that using a public PKI with client certs is a recipe for disaster because it's so easy and common to screw up.