-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Server Key Exchange should process PSK Identity as per RFC #4279 #2508
Comments
@ManojKrSrivastava Thank you for reporting this issue! AFAIK, the server parse the PSK identity in Is the negotiated cipher suite PSK based? Did you supply in your server configuration your own psk parsing callback or used the default psk_callback as shown in the example? Regards, |
@RonEld Thank you for your reply and query. Yes, it is parsing PSK identity in ssl_parse_client_psk_identity() but it is failing during Negotiated cipher suite is not PSK based.
Please let me know if clarification required. Best Regards, |
Hi @ManojKrSrivastava Please note that version 1.3 has reached End Of Life about a year ago, and not supported anymore. Have you called |
Hi @RonEld, Best Regards, |
Hi @RonEld , In 'ssl_parse_server_psk_hint()' function, there is note mentioning followings: I think support for PSK identity hint is not available. Best Regards, |
Hi @RonEld, Can you please let me know which branch I should refer for TLS v1.3 development? Best Regards, |
TLS 1.3 is currently supported on development, and an initial version has been released in Mbed TLS 3.1. Work is currently continuing to support more features of TLS 1.3 (e.g., PSK support is planned for Q2/Q3 timeframe - please see https://github.com/orgs/Mbed-TLS/projects/1#column-17950145 ). |
Description
As per section #5 of RFC #4279, Server key exchange should process PSK identity hint provided in Client Hello. I have seen the ssl_srv.c code and it's having a check and it's returning error as MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE instead of processing PSK identity hint provided in Client Hello. This is an essential requirement considering increasing Use Cases of IoT.
Bug
OS
Mbed OS|linux|windows|
mbed TLS build:
Version: x.x.x or git commit id
OS version: x.x.x
Configuration: please attach config.h file where possible
Compiler and options (if you used a pre-built binary, please indicate how you obtained it):
Additional environment information:
Peer device TLS stack and version
OpenSSL|GnuTls|Chrome|NSS(Firefox)|SecureChannel (IIS/Internet Explorer/Edge)|Other
Version:
Expected behavior
Actual behavior
Steps to reproduce
Enhancement\Feature Request
Justification - why does the library need this feature?
Suggested enhancement
Question
Please first check for answers in the Mbed TLS knowledge Base, and preferably file an issue in the Mbed TLS support forum
The text was updated successfully, but these errors were encountered: