[TLS] [Errata Verified] RFC9257 (7643)
RFC Errata System <rfc-editor@rfc-editor.org> Fri, 14 November 2025 15:45 UTC
Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: tls@ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 7EDB1898C13E; Fri, 14 Nov 2025 07:45:42 -0800 (PST)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id 3B2EDC000CC5; Fri, 14 Nov 2025 07:45:42 -0800 (PST)
To: hvn@radiatorsoftware.com, housley@vigilsec.com, jonathan.hoyland@gmail.com, mohit@iki.fi, caw@heapingbits.net
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20251114154542.3B2EDC000CC5@rfcpa.rfc-editor.org>
Date: Fri, 14 Nov 2025 07:45:42 -0800
Message-ID-Hash: LVGJE37P7CWT4P5KZWSNE22ZXPOHKH3J
X-Message-ID-Hash: LVGJE37P7CWT4P5KZWSNE22ZXPOHKH3J
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: paul.wouters@aiven.io, iesg@ietf.org, tls@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] [Errata Verified] RFC9257 (7643)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/dJmCbDKzB93zE0_7dMy9_rZg6b4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
The following errata report has been verified for RFC9257, "Guidance for External Pre-Shared Key (PSK) Usage in TLS". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid7643 -------------------------------------- Status: Verified Type: Technical Reported by: Heikki Vatiainen <hvn@radiatorsoftware.com> Date Reported: 2023-09-17 Verified by: Paul Wouters (IESG) Section: 6.1. Stack Interface Original Text ------------- * OpenSSL and BoringSSL: Applications can specify support for external PSKs via distinct ciphersuites in TLS 1.2 and below. Also, they can then configure callbacks that are invoked for PSK selection during the handshake. These callbacks must provide a PSK identity and key. The exact format of the callback depends on the negotiated TLS protocol version, with new callback functions added specifically to OpenSSL for TLS 1.3 [RFC8446] PSK support. The PSK length is validated to be between 1-256 bytes (inclusive). The PSK identity may be up to 128 bytes long. Corrected Text -------------- * OpenSSL and BoringSSL: Applications can specify support for external PSKs via distinct ciphersuites in TLS 1.2 and below. Also, they can then configure callbacks that are invoked for PSK selection during the handshake. These callbacks must provide a PSK identity and key. The exact format of the callback depends on the negotiated TLS protocol version, with new callback functions added specifically to OpenSSL for TLS 1.3 [RFC8446] PSK support. The PSK length is validated to be between 1-256 bytes (inclusive). The PSK identity may be up to 128 bytes long. OpenSSL 3.0 increased PSK maximum length to 512 bytes and PSK identity maximum length to 256 bytes to match existing implementations and specifications. Notes ----- OpenSSL PSK length and PSK identity length were increased to 256 and 512 octets, respectively, for OpenSSL 3.0. There appear to be implementations and specifications that require these longer lengths. See here for more information: https://github.com/openssl/openssl/pull/12777 https://github.com/openssl/openssl/pull/12771 -------------------------------------- RFC9257 (draft-ietf-tls-external-psk-guidance-06) -------------------------------------- Title : Guidance for External Pre-Shared Key (PSK) Usage in TLS Publication Date : July 2022 Author(s) : R. Housley, J. Hoyland, M. Sethi, C. A. Wood Category : INFORMATIONAL Source : Transport Layer Security Stream : IETF Verifying Party : IESG
- [TLS] [Errata Verified] RFC9257 (7643) RFC Errata System