47 bytes, text/x-phabricator-request
|Details | Review|
User Agent: Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:63.0) Gecko/20100101 Firefox/63.0 Steps to reproduce: Go to a URL that requires TLS 1.3 post-handshake authentication. This can be tested by using Apache 2.4.37 (or later) ensuring that TLS 1.3 is enabled (which it is by default if OpenSSL 1.1 is used to build Apache), and using "SSLVerifyClient require" inside of a Location or Directory section. For example: --- SSLCACertificateFile /etc/ssl/DoD_CAs.pem SSLOCSPEnable on <Directory /var/www/localhost/htdocs/cac> SSLOptions +StrictRequire SSLRequireSSL SSLVerifyClient require SSLVerifyDepth 10 SSLOptions +FakeBasicAuth </Directory> --- See https://bz.apache.org/bugzilla/show_bug.cgi?id=62975 for this issue being reported in Apache (which is invalid; the problem is in Firefox). Please feel free to test this behavior at https://www.integralblue.com/testhandshake/ Actual results: An Apache error page is generated with this text: --- You don't have permission to access /testhandshake/ on this server. Reason: Cannot perform Post-Handshake Authentication. --- Expected results: Firefox should have performed client certificate authentication (such as asking for the PIN for my smartcard).
The same issue occurs in Chrome; this issue has been reported to Chromium at https://bugs.chromium.org/p/chromium/issues/detail?id=911653
Component: Untriaged → Security: PSM
Product: Firefox → Core
Pushed by firstname.lastname@example.org: https://hg.mozilla.org/integration/autoland/rev/1bb8ad865648 enable TLS 1.3 post-handshake authentication r=keeler
Assignee: nobody → dueno
You need to log in before you can comment on or make changes to this bug.