HFDU is good.  Many X25519 implementations won't be concerned about this 
detail, but others might.  We might fix it in one of two ways: twiddle those 
bits as X25519 requires or note that the private values were the untwiddled/raw 
values.

On Mon, Mar 18, 2024, at 15:26, Sean Turner wrote:
> Hi! This has been lingering for a while, I tend to think we could mark 
> it as HFDU (hold for document update).
>
> spt
>
>> On Feb 28, 2019, at 16:20, RFC Errata System <rfc-edi...@rfc-editor.org> 
>> wrote:
>> 
>> The following errata report has been submitted for RFC8448,
>> "Example Handshake Traces for TLS 1.3".
>> 
>> --------------------------------------
>> You may review the report below and at:
>> http://www.rfc-editor.org/errata/eid5645
>> 
>> --------------------------------------
>> Type: Technical
>> Reported by: Anthony Mai <mai_anth...@hotmail.com>
>> 
>> Section: 2
>> 
>> Original Text
>> -------------
>>   Ephemeral private keys are shown as they are generated in the traces.
>> 
>> Corrected Text
>> --------------
>>   Ephemeral private keys are shown as they are generated in the traces.
>> Note that X25519 private keys are trimmed in accordance to [RFC 7748]
>> Section 5, before use. This is done by clearing bit 0 to 2 of the first
>> byte and bit 7 of the last byte. And then set bit 6 of the last byte.
>> 
>> Notes
>> -----
>> On page 3,5,16,20,29,43,44,55,57, there are ten X25519 ephemeral private
>> keys listed. None of these private key value, when used directly in X25519
>> calculation, will yield the associated public key listed. These private key
>> values are not the actual values used. Instead up to 5 bits are modified as
>> recommended by RFC 7748 section 5. Some implementations may choose NOT to
>> do such trimming, and it does not affect the connectivity, as the private
>> keys are never sent over the wire and does not affect network behavior.
>> 
>> Not clarifying how the X25519 private keys were modified before using could
>> cause serious confusion. I personally struggled for a day before figuring
>> out this little obscure detail.
>> 
>> Instructions:
>> -------------
>> This erratum is currently posted as "Reported". If necessary, please
>> use "Reply All" to discuss whether it should be verified or
>> rejected. When a decision is reached, the verifying party  
>> can log in to change the status and edit the report, if necessary. 
>> 
>> --------------------------------------
>> RFC8448 (draft-ietf-tls-tls13-vectors-07)
>> --------------------------------------
>> Title               : Example Handshake Traces for TLS 1.3
>> Publication Date    : January 2019
>> Author(s)           : M. Thomson
>> Category            : INFORMATIONAL
>> Source              : Transport Layer Security
>> Area                : Security
>> Stream              : IETF
>> Verifying Party     : IESG
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to