Is it not possible to construct a channel binding for whatever underlying
protocol was used to agree the PSK and use that as the PSK identity.
If the PSK was created in TLS 1.2 then that would be something derived from
`tls-unique`.

The security of a channel binding is not dependent on it being secret, and
thus using it as the PSK identity is safe.

Doing this would prove agreement on the KDF used, and would be bound to the
handshake by the PSK binders.
Assuming that the KDF was something acceptably secure, this would mitigate
the risk of collisions between hash outputs, because which hash function
was used to produce the PSK would be an agreed value.

That would also require no changes to the key schedule, which is perhaps
lower risk.

This of course assumes that both parties agree that this is how the PSK
identity was constructed,  so it would probably need an extension.

Regards,

Jonathan

On Fri, 15 Jun 2018 at 15:25 Salz, Rich <rsalz=40akamai....@dmarc.ietf.org>
wrote:

>
> >    that's not workable.
>
> It's not great, however
>
> >    the reason why implementations chose to use old API to provision TLS
> 1.3 PSKs
>     was to make the upgrade process as smooth as possible, disabling TLS
> 1.3 is
>     quite antithetical to that
>
> Disabling TLS 1.3 for those using 1.2 PSK's is unlikely to affect most
> uses, and seems the only way forward.
>
> Do you have an alternative solution?
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to