On Thu, May 10, 2018 at 6:46 AM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

>
>
> > On May 10, 2018, at 7:48 AM, Eric Rescorla <e...@rtfm.com> wrote:
> >
> > The option for multiple PSKs is something that is used in pure PSK modes,
> > but I confess to not fully understanding the reasons you might use
> multiple
> > PSKs.  I suspect that they are most useful during a key rollover.
> >
> > Also, resumption of sessions created with PSKs
>
> So I am not hearing any intent to support multiple resumption PSKs
> (session tickets) in the same handshake.
>
> How are TLS 1.3 server implementations approaching distinguishing
> between external PSK identities and (RFC5077) resumption PSKs, so
> that one does not end up looking for RFC5077 key names to decrypt
> an external PSK, or pass resumption PSKs to the code that implements
> external PSKs?
>
> Do you prepend some new "magic" to the (RFC5077 or similar) session
> tickets?  Or just look for a matching STEK key name and let that be
> the "magic"?
>

I would imagine, but NSS, at least, doesn't support external PSKs.

-Ekr


> --
>         Viktor.
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to