Christian:
> 
> Thanks. I am not 100% sure that we actually have an attack against the 
> [EC]DH+PSK combination, but I am confident than if the PSK secret is weak, 
> the attacker can get to the early data. If only for that, it is prudent to 
> use long enough PSK.

As stated in draft-ietf-tls-8773bis, some people are interested in using the 
external PSK with a certificate to protect against the future invention of a 
Cryptographically Relevant Quantum Computer (CRQC).  Others want to use of a 
public key with a factory-provisioned secret value for the initial enrollment 
of a device in an enterprise network (for example 
draft-ietf-emu-bootstrapped-tls).

For the security consideration, I suggest an additional paragraph:

        Implementations must use sufficiently large external PSKs.  For 
protection
        against the future invention of a CRQC, the external PSK needs to be at
        least 256 bits.

Does that resolve your concern?

Russ


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to