It's client cert plus login/pass.
I might add an option for cert auth to bypass login/pass though ...
That would be good.
It makes sense to not have to supply credentials on the local network. Only forward the HTTPS port with client cert authentication, and with that, you'd be as safe as with VPN or SSH.
The login doesn't add anything on top of that, the client certificate is a much safer way of logging in, and it requires authentication even before the HTTP server itself is involved.
Well, if you use the cacert.pem I was pointing at and a client cert issued by one of those Root CAs (StartSSL, CAcert, ....), ANYONE with a valid certificate from that Root CA could sign in.
We would only know WHO signed in.
Client cert is only enough if the only root CA allowed is your own one and not for example StartSSL, CAcert, ...
And at the moment, client cert auth is rather useless:
Chrome on Android theoretically supports client cert auth, but the used layer was broken in Android 3.0 and still is at least up to Android 4.1.2.
Dreamdroid uses the same layer ...
And even if that layer would work again, Android still requires the user to change the unlock security to anything more protectice than wiping, which most users consider annoying.
Firefox für Android and the Android Browser have working client cert auth, but only Firefox can offer this without changing the lock screen.