Christian:
>
> Thanks. I am not 100% sure that we actually have an attack against the
> [EC]DH+PSK combination, but I am confident than if the PSK secret is weak,
> the attacker can get to the early data. If only for that, it is prudent to
> use long enough PSK.
As stated in draft-ietf-tls-8773bis, some people are interested in using the
external PSK with a certificate to protect against the future invention of a
Cryptographically Relevant Quantum Computer (CRQC). Others want to use of a
public key with a factory-provisioned secret value for the initial enrollment
of a device in an enterprise network (for example
draft-ietf-emu-bootstrapped-tls).
For the security consideration, I suggest an additional paragraph:
Implementations must use sufficiently large external PSKs. For
protection
against the future invention of a CRQC, the external PSK needs to be at
least 256 bits.
Does that resolve your concern?
Russ
_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls