I apologize if this topic was previously discussed, I've only recently joined the TLS mailer list. While reviewing the TLS 1.3 draft (revision 10), section 7 begins with the following wording:

   In order to begin connection protection, the TLS Record Protocol
   requires specification of a suite of algorithms, a master secret, and
   the client and server random values.

However, when reading through all of section 7, there appears to be no explicit use for the client and server random values. While these values would be used implicitly when the handshake messages are hashed, and thus have bearing on the key schedule calculation, there appears to be no explicit use of the client and server random values similar to section 6.3 in the TLS 1.2 spec.

Am I interpreting this properly? If the client and server random values are no longer explicitly used in any key derivation logic, maybe this should be noted in section 6.3.1, as implementors will no longer need to parse these values when processing incoming messages. Additionally, the intro to section 7 is misleading to implementors, as it implies the client and server random values are needed to derive the key schedule.

The following issue and PR appear to be related to my question:

https://github.com/tlswg/tls13-spec/issues/185
https://github.com/tlswg/tls13-spec/pull/189




_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to