From 354e010757b95d27fb36d364412ee7a5e7111963 Mon Sep 17 00:00:00 2001 From: Matt Caswell Date: Thu, 23 Aug 2018 14:37:01 +0100 Subject: [PATCH] Add a note in the docs about sharing PSKs between TLSv1.2 and TLSv1.3 Fixes #6490 Reviewed-by: Tim Hudson Reviewed-by: Paul Yang (Merged from https://github.com/openssl/openssl/pull/7044) --- doc/man3/SSL_CTX_set_psk_client_callback.pod | 8 ++++++++ doc/man3/SSL_CTX_use_psk_identity_hint.pod | 10 ++++++++++ 2 files changed, 18 insertions(+) diff --git a/doc/man3/SSL_CTX_set_psk_client_callback.pod b/doc/man3/SSL_CTX_set_psk_client_callback.pod index 6d1a9b57b7..eb4e4f5fa4 100644 --- a/doc/man3/SSL_CTX_set_psk_client_callback.pod +++ b/doc/man3/SSL_CTX_set_psk_client_callback.pod @@ -132,6 +132,14 @@ Note that parameter B given to the callback may be B. A connection established via a TLSv1.3 PSK will appear as if session resumption has occurred so that L will return true. +There are no known security issues with sharing the same PSK between TLSv1.2 (or +below) and TLSv1.3. However the RFC has this note of caution: + +"While there is no known way in which the same PSK might produce related output +in both versions, only limited analysis has been done. Implementations can +ensure safety from cross-protocol related output by not reusing PSKs between +TLS 1.3 and TLS 1.2." + =head1 RETURN VALUES Return values from the B callback are interpreted as diff --git a/doc/man3/SSL_CTX_use_psk_identity_hint.pod b/doc/man3/SSL_CTX_use_psk_identity_hint.pod index 2b2bc3e20d..c8f7526610 100644 --- a/doc/man3/SSL_CTX_use_psk_identity_hint.pod +++ b/doc/man3/SSL_CTX_use_psk_identity_hint.pod @@ -123,6 +123,16 @@ completely. The B callback should return 1 on success or 0 on failure. In the event of failure the connection setup fails. +=head1 NOTES + +There are no known security issues with sharing the same PSK between TLSv1.2 (or +below) and TLSv1.3. However the RFC has this note of caution: + +"While there is no known way in which the same PSK might produce related output +in both versions, only limited analysis has been done. Implementations can +ensure safety from cross-protocol related output by not reusing PSKs between +TLS 1.3 and TLS 1.2." + =head1 SEE ALSO L, -- 2.25.1