On Tue, Dec 22, 2015 at 2:09 PM, Brian Smith <br...@briansmith.org> wrote:

> If an implementation only implements ECDHE cipher suites then
> implementing the session hash extension is not necessary, according to RFC
> 7627. I believe there are also a few other factors that would implementing
> the session hash extension to be unnecessary.
>
> If checking that the shared value isn't zero is sufficient, and/or
> blacklisting the public values that DJB mentions in [1] is sufficient,
> either would be better than mandating the implementation of the session
> hash extension just for this purpose.
>

Actually, the check for a result of zero is already required in the current
CFRG draft; see [1]. So, I think that the easiest way to fix the TLS draft
is to just delete the misleading text.

[1] https://tools.ietf.org/html/draft-irtf-cfrg-curves-11#section-6.1

Cheers,
Brian
-- 
https://briansmith.org/
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to