Thanks to another post I was able to set up the tlsproxy correctly for TLS12 to TLS13.
However, I am now struggling to set up a tunnel where client certificate authentication is requested by the remote server.
When testing without any option set, I am seeing the following in the verbose logs
09:24:41 DBG Tunnel(1)[#3][O]: Client certificate authentication was requested.
09:24:41 DBG Tunnel(1)[#3][O]: No suitable client certificate is available.
when I make a call (Powershell) like
Invoke-WebRequest http://localhost:2283/ -CertificateThumbprint cbc5a1e65cbf35ba1768a644f2cff1040b1c7850
So it looks like tlsproxy sees this correctly. I just don't know where it is looking for the client certificate.
Playing around with --request-client-certificate true
and --http-x-ssl-cert
doesn't seem to do much. The result is always the same with 'No suitable client certificate is available.'
I'm also not sure how those options would work as the proxy would need access to the private key of the certificate. Without the private key, everything would have to be passed back to the client who has access to the private key.
I don't have a problem exposing my certificate to the proxy (only client passing through the tunnel) so specifying it there would be the easiest.
Any ideas?