Certificates should have a maximum lifetime, and SPAKE2 identities should be SPKI not cert fingerprint #282
Labels
security-tracker
Group bringing to attention of security, or tracked by the security Group but not needing response.
v1-spec
To encourage certificate agility, consider adding a relatively short maximum lifetime as in WebTransport (https://w3c.github.io/webtransport/#custom-certificate-requirements). This change would imply that the SPAKE2 identity should be formed from the subject public key (https://tools.ietf.org/html/rfc7469#section-2.4) instead of from the certificate fingerprint, to avoid forcing a fresh SPAKE2 authentication whenever the server renews its certificate.
On a handwavier note, I wonder if there is a way to allow SPKI rotation without forcing a new SPAKE2 flow -- maybe by allowing the old key to sign the new key?
The text was updated successfully, but these errors were encountered: