Ya I think failing hard depends on the use case for the external psk. For 
example if external psk is your own source of identity then ya you can't really 
fallback, however if you are using external psk as an optimization or something 
else, then falling back might be desirable.

Subodh
________________________________
From: Christopher Wood <christopherwoo...@gmail.com>
Sent: Monday, November 5, 2018 6:56:57 PM
To: Subodh Iyengar
Cc: <tls@ietf.org>
Subject: Re: [TLS] draft-wood-tls-external-psk-importer-00

On Tue, Nov 6, 2018 at 12:56 AM Subodh Iyengar <sub...@fb.com> wrote:
>
> I brought up an alternate construction in BKK for 
> draft-wood-tls-external-psk-importer-00 which might have some potentially 
> better properties. I didn't get time to explain then, so here it is:
>
> One issue I think with the current construction in the draft with external 
> psk is that if the client uses the external psk with a different hash 
> function due to configuration error, then it turns into a fatal connection 
> error because TLS endpoints are required to tear down the connections on 
> binder mismatch. The client does not recover until it stops using the 
> external psk.
>
> An alternate approach to solve this could be to have a construction like:
>
> [hash of (psk identity + ImportedIdentity)] [psk identity]
>
> A server that uses the psk would perform the following steps during the 
> resumption
>
> Negotiate the cipher suite to use
> If an external psk is used, strip off the first hash length of the psk 
> identity where the hash length depends on the cipher suite.
> Compute the hash of pskidentity + imported identity and compare it against (2)
> If it doesn't match, don't use the PSK and fallback to full handshake.
>
>
> I think this a subtle change, because if you treat this case as if you were 
> not willing to use the PSK, then you can ignore the binder. This might be 
> operationally easier to deploy and reason about than a hard failure.

Thanks for writing this down! This is certainly an interesting
proposal. That said, in cases where one might use external PSKs,
failing hard seems like a fine (and probably preferred?) outcome. I'd
be happy to hear of cases where one might want to fall back to a full
handshake.

Best,
Chris
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to