On Wed, Sep 21, 2016 at 1:33 PM, David Woodhouse <dw...@infradead.org>
wrote:

> On Wed, 2016-09-21 at 23:00 +0300, Ilari Liusvaara wrote:
> > On Wed, Sep 21, 2016 at 08:16:15PM +0100, David Woodhouse wrote:
> > >
> > > On Wed, 2016-09-21 at 17:46 +0000, Raja ashok wrote:
> > >
> > > >
> > > > [ashok] : I feel sending the selected ID is better, otherwise while
> > > > process "server hello" msg, client has to maintain the PSK ID list in
> > > > the same order in which it sent. Already there was a discussion in
> > > > TLS1.3 group for sending selected ID instead of index.
> > > There is also discussion of supporting only a *single* PSK identity in
> > > TLSv1.3. If that happens, is there a real need for the extension to
> > > permit more than one identity in TLS <= 1.2.
> > Is the intended usecase some "IoT"/"embedded" devices? If so, I think
> > this is *extremely* bad idea.
> >
> > Those things tend to have very long lifespans, so one shouldn't put
> > one out except with cutting-edge stuff. Anything less, and there is
> > substantial risk of it going bad during lifetime.
> >
> > It would be possible to retrofit an extension to do multiple identites
> > at once into TLS 1.3 even if baseline TLS 1.3 allows only one, altough
> > implementing it probably will not be pleasant.[1]
>
> Typically I would expect that a given IoT client would still support
> only one form of PSK, and offer one identifier. The update model would
> be that the server accepts *either* the old or the new keys, and
> clients are slowly upgraded to offer the latter. But still only one at
> a time?
>
> > [1] E.g. altering hello_finished to be a list, one entry for each
> > identity, or omitting it entierely for "implicit finished with the
> > used 0-RTT key before ServerHello" trick I outlined earlier.
> >
> > (Neither is probably pleasant to implement... The latter is probably
> > easier if the library architecture is suitable).
>
> I had also suggested including a hello_finished only for the first
> (preferred) PSK identity. If the server doesn't want that one, it can
> send a HelloRetryRequest with a PreSharedKeyExtension indicating which
> PSK identity it *does* want.
>

I don't see how this is appreciably easier than just having the client
offer one and then
the server HRR.

-Ekr


>
> Or did I miss a reason why that wasn't sufficient and *each*
> ClientHello needed to be validated? I confess I've only been looking at
> this for the last day or so.
>
> --
> dwmw2
>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to