Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verification of PSK modes #377

Merged
merged 3 commits into from
Jul 16, 2019
Merged

Verification of PSK modes #377

merged 3 commits into from
Jul 16, 2019

Conversation

ocheron
Copy link
Contributor

@ocheron ocheron commented Jul 11, 2019

Makes client extension "psk_key_exchange_modes" mandatory for PSK handshake, and verifies adequacy of server-selected cipher.

Sending NST when PSK_DHE_KE is not supported is not useful, the implementation is not able to resume with PSK_KE.

Adds requirement from RFC 8446 section 4.2.9:

   If clients offer "pre_shared_key" without a
   "psk_key_exchange_modes" extension, servers MUST abort the
   handshake.  Servers MUST NOT select a key exchange mode that is not
   listed by the client.  This extension also restricts the modes for
   use with PSK resumption.
Follows recommandation from RFC 8446 section 4.2.9:

   Servers SHOULD NOT send NewSessionTicket with tickets that are not
   compatible with the advertised modes; however, if a server does so,
   the impact will just be that the client's attempts at resumption
   fail.
Copy link
Collaborator

@kazu-yamamoto kazu-yamamoto left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

kazu-yamamoto added a commit to kazu-yamamoto/hs-tls that referenced this pull request Jul 16, 2019
@kazu-yamamoto kazu-yamamoto merged commit 5e2fba6 into haskell-tls:master Jul 16, 2019
@kazu-yamamoto
Copy link
Collaborator

Merged.

@ocheron ocheron deleted the psk-modes branch July 17, 2019 18:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants