Guidance for External PSK Usage in TLS
draft-dt-tls-external-psk-guidance-01

Document Type Replaced Internet-Draft (tls WG)
Last updated 2020-06-17 (latest revision 2020-04-06)
Replaced by draft-ietf-tls-external-psk-guidance
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-tls-external-psk-guidance
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-dt-tls-external-psk-guidance-01.txt

Abstract

This document provides usage guidance for external Pre-Shared Keys (PSKs) in TLS. It lists TLS security properties provided by PSKs under certain assumptions and demonstrates how violations of these assumptions lead to attacks. This document also discusses PSK use cases, provisioning processes, and TLS stack implementation support in the context of these assumptions. It provides advice for applications in various use cases to help meet these assumptions.

Authors

Russ Housley (housley@vigilsec.com)
Jonathan Hoyland (jonathan.hoyland@gmail.com)
Mohit Sethi (mohit@piuha.net)
Christopher Wood (caw@heapingbits.net)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)