On Fri, Feb 21, 2020 at 8:35 AM Eric Rescorla <e...@rtfm.com> wrote: > > > On Thu, Feb 20, 2020 at 7:08 PM Rob Sayre <say...@gmail.com> wrote: > >> Hi, >> >> I'm not sure how violations of these requirements would result in >> poor interoperability: >> >> Clients which import external keys TLS MUST NOT use these keys for >> any other purpose. Moreover, each external PSK MUST be associated >> with at most one hash function. >> >> These seem like aspirational security goals. It would be better to >> describe the consequences of violating these conditions. >> > > I don't agree. They are requirements in order to be able to make the > assertions we want to make about the security of the protocol. > > This is consistent with the following text of RFC 2119 S 6 > ".. or to limit behavior which has potential for causing harm (e.g., > limiting retransmisssions) " > > I don't think it would be unreasonable.to explain the reason for these, > though this is already a requirement of 8446 S 4.2.11 (though without > justification). >
I think that interpretation of 2119 is a stretch, but your idea to add an explanation while keeping the 2119 terms addresses my concern. At the very least, the draft should note this is already a requirement of 8446. thanks, Rob
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls