Eric:

I looked at Hugo's message in the context of the table in Section 7.1:

     Key Exchange            Static Secret (SS)    Ephemeral Secret (ES)
     ------------            ------------------    ---------------------
     (EC)DHE                   Client ephemeral         Client ephemeral
     (full handshake)       w/ server ephemeral      w/ server ephemeral

     (EC)DHE                   Client ephemeral         Client ephemeral
     (w/ 0-RTT)                w/ server static      w/ server ephemeral

     PSK                         Pre-Shared Key           Pre-shared key

     PSK + (EC)DHE               Pre-Shared Key         Client ephemeral
                                                     w/ server ephemeral

If I understand Hugo's message correctly, he is saying that in the second row, 
the SS must be part of the key derivation.  I think we need to consider the 
bottom row as well.

It seems to me that using the master_secret capture the benefits of both the SS 
and the ES.  This meets Hugo's requirement for the second row, and gets the 
benefits of the ephemeral values for the bottom row.

Russ


On Sep 4, 2015, at 11:33 AM, Eric Rescorla wrote:

> See:
> http://www.ietf.org/mail-archive/web/tls/current/msg17184.html
> 
> On Fri, Sep 4, 2015 at 8:27 AM, Russ Housley <hous...@vigilsec.com> wrote:
> In Section 7.1, the document says:
> 
>      4. finished_secret = HKDF-Expand-Label(xSS,
>                                             "finished secret",
>                                             handshake_hash, L)
> 
>      5. resumption_secret = HKDF-Expand-Label(master_secret,
>                                               "resumption master secret"
>                                               session_hash, L)
> 
> Why don't we use the master_secret in both the finished_secret and the 
> resumption_secret formula?
> 
> Russ

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to