[prev in list] [next in list] [prev in thread] [next in thread]
List: ietf-tls
Subject: [TLS] [Errata Held for Document Update] RFC8446 (5717)
From: RFC Errata System <rfc-editor () rfc-editor ! org>
Date: 2024-03-29 1:17:26
Message-ID: 20240329011726.4A87E191A4B5 () rfcpa ! amsl ! com
[Download RAW message or body]
The following errata report has been held for document update
for RFC8446, "The Transport Layer Security (TLS) Protocol Version 1.3".
--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid5717
--------------------------------------
Status: Held for Document Update
Type: Editorial
Reported by: Daniel Migault <daniel.migault@ericsson.com>
Date Reported: 2019-05-03
Held by: Paul Wouters (IESG)
Section: 2.2.
Original Text
-------------
Figure 3 shows a pair of handshakes in which the first handshake
establishes a PSK and the second handshake uses it:
Client Server
Initial Handshake:
ClientHello
+ key_share -------->
ServerHello
+ key_share
{EncryptedExtensions}
{CertificateRequest*}
{Certificate*}
{CertificateVerify*}
{Finished}
<-------- [Application Data*]
{Certificate*}
{CertificateVerify*}
{Finished} -------->
<-------- [NewSessionTicket]
[Application Data] <-------> [Application Data]
Subsequent Handshake:
ClientHello
+ key_share*
+ pre_shared_key -------->
ServerHello
+ pre_shared_key
+ key_share*
{EncryptedExtensions}
{Finished}
<-------- [Application Data*]
{Finished} -------->
[Application Data] <-------> [Application Data]
Figure 3: Message Flow for Resumption and PSK
Corrected Text
--------------
Figure 3 shows a pair of handshakes in which the first handshake
establishes a PSK and the second handshake uses it:
Client Server
Initial Handshake:
ClientHello
+ key_share -------->
ServerHello
+ key_share
{EncryptedExtensions}
{CertificateRequest*}
{Certificate*}
{CertificateVerify*}
{Finished}
<-------- [Application Data*]
{Certificate*}
{CertificateVerify*}
{Finished} -------->
<-------- [NewSessionTicket]
[Application Data] <-------> [Application Data]
Subsequent Handshake:
ClientHello
+ key_share*
+ psk_key_exchange_modes
+ pre_shared_key -------->
ServerHello
+ pre_shared_key
+ key_share*
{EncryptedExtensions}
{Finished}
<-------- [Application Data*]
{Finished} -------->
[Application Data] <-------> [Application Data]
Figure 3: Message Flow for Resumption and PSK
Notes
-----
The pre_shared_key requires the pre_share_key extension.
This Issue and PR should address this erratum:
https://github.com/tlswg/tls13-spec/issues/1344
https://github.com/tlswg/tls13-spec/pull/1345
--------------------------------------
RFC8446 (draft-ietf-tls-tls13-28)
--------------------------------------
Title : The Transport Layer Security (TLS) Protocol Version 1.3
Publication Date : August 2018
Author(s) : E. Rescorla
Category : PROPOSED STANDARD
Source : Transport Layer Security
Stream : IETF
Verifying Party : IESG
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic