It was resolved as Hold For Document Update, because the bis document
resolved it by saying:

In order to accept early data, the server MUST have selected the first key
offered in the client's "pre_shared_key" extension. In addition, it MUST
verify that the following values are the same as those associated with the
selected PSK:

The selected TLS version number

The selected cipher suite

The selected ALPN [RFC7301 <https://www.rfc-editor.org/rfc/rfc7301>]
protocol, if any
These requirements are a superset of those needed to perform a 1-RTT
handshake using the PSK in question.Future extensions MUST define their
interaction with 0-RTT.


So no textual changes from the bis will be done for this errata, and this
bis text is considered closing that errata issue.

if you still disagree, please let me know and share your proposed changed
text for the bis document :)

Paul




On Thu, Oct 17, 2024 at 6:06 PM Martin Thomson <m...@lowentropy.net> wrote:

> Based on the snippet here, I agree with David.
>
> On Fri, Oct 18, 2024, at 07:19, David Benjamin wrote:
> > I don't think this erratum is correct. This is due to some weird
> > allowance in PSK acceptance. You are allowed to use the PSK with a
> > different cipher suite if the hash portion matches. But early data
> > requires an exact match on top of it.
> >
> > On Thu, Oct 17, 2024, 12:21 RFC Errata System <rfc-edi...@rfc-editor.org>
> wrote:
> >> The following errata report has been held for document update
> >> for RFC8446, "The Transport Layer Security (TLS) Protocol Version 1.3".
> >>
> >> --------------------------------------
> >> You may review the report below and at:
> >> https://www.rfc-editor.org/errata/eid6147
> >>
> >> --------------------------------------
> >> Status: Held for Document Update
> >> Type: Editorial
> >>
> >> Reported by: Ben Smyth <resea...@bensmyth.com>
> >> Date Reported: 2020-04-29
> >> Held by: Paul Wouters (IESG)
> >>
> >> Section: 4.2.10.
> >>
> >> Original Text
> >> -------------
> >> In order to accept early data, the server MUST have accepted a PSK
> >> cipher suite....In addition, it MUST verify that the
> >> following values are the same as those associated with the
> >> selected PSK:
> >>
> >> ...
> >>
> >> -  The selected cipher suite
> >>
> >> Corrected Text
> >> --------------
> >>
> >>
> >> Notes
> >> -----
> >> Accepting the "PSK cipher suite" surely implies the PSK is associated
> with the cipher suite, hence,
> >> "The selected cipher suite" can be dropped.
> >>
> >> Paul Wouters(SEC AD): The text was changed a little to solve this issue
> >>
> >> --------------------------------------
> >> RFC8446 (draft-ietf-tls-tls13-28)
> >> --------------------------------------
> >> Title               : The Transport Layer Security (TLS) Protocol
> Version 1.3
> >> Publication Date    : August 2018
> >> Author(s)           : E. Rescorla
> >> Category            : PROPOSED STANDARD
> >> Source              : Transport Layer Security
> >> Stream              : IETF
> >> Verifying Party     : IESG
> >>
> >> _______________________________________________
> >> TLS mailing list -- tls@ietf.org
> >> To unsubscribe send an email to tls-le...@ietf.org
> > _______________________________________________
> > TLS mailing list -- tls@ietf.org
> > To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to