[TLS] [Errata Verified] RFC9257 (7643)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 14 November 2025 15:45 UTC

Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: tls@ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 7EDB1898C13E; Fri, 14 Nov 2025 07:45:42 -0800 (PST)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id 3B2EDC000CC5; Fri, 14 Nov 2025 07:45:42 -0800 (PST)
To: hvn@radiatorsoftware.com, housley@vigilsec.com, jonathan.hoyland@gmail.com, mohit@iki.fi, caw@heapingbits.net
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20251114154542.3B2EDC000CC5@rfcpa.rfc-editor.org>
Date: Fri, 14 Nov 2025 07:45:42 -0800
Message-ID-Hash: LVGJE37P7CWT4P5KZWSNE22ZXPOHKH3J
X-Message-ID-Hash: LVGJE37P7CWT4P5KZWSNE22ZXPOHKH3J
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: paul.wouters@aiven.io, iesg@ietf.org, tls@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] [Errata Verified] RFC9257 (7643)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/dJmCbDKzB93zE0_7dMy9_rZg6b4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

The following errata report has been verified for RFC9257,
"Guidance for External Pre-Shared Key (PSK) Usage in TLS". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7643

--------------------------------------
Status: Verified
Type: Technical

Reported by: Heikki Vatiainen <hvn@radiatorsoftware.com>
Date Reported: 2023-09-17
Verified by: Paul Wouters (IESG)

Section: 6.1. Stack Interface

Original Text
-------------
   *  OpenSSL and BoringSSL: Applications can specify support for
      external PSKs via distinct ciphersuites in TLS 1.2 and below.
      Also, they can then configure callbacks that are invoked for PSK
      selection during the handshake.  These callbacks must provide a
      PSK identity and key.  The exact format of the callback depends on
      the negotiated TLS protocol version, with new callback functions
      added specifically to OpenSSL for TLS 1.3 [RFC8446] PSK support.
      The PSK length is validated to be between 1-256 bytes (inclusive).
      The PSK identity may be up to 128 bytes long.

Corrected Text
--------------
   *  OpenSSL and BoringSSL: Applications can specify support for
      external PSKs via distinct ciphersuites in TLS 1.2 and below.
      Also, they can then configure callbacks that are invoked for PSK
      selection during the handshake.  These callbacks must provide a
      PSK identity and key.  The exact format of the callback depends on
      the negotiated TLS protocol version, with new callback functions
      added specifically to OpenSSL for TLS 1.3 [RFC8446] PSK support.
      The PSK length is validated to be between 1-256 bytes (inclusive).
      The PSK identity may be up to 128 bytes long. OpenSSL 3.0
      increased PSK maximum length to 512 bytes and PSK identity maximum
      length to 256 bytes to match existing implementations and
      specifications.

Notes
-----
OpenSSL PSK length and PSK identity length were increased to 256 and 512 octets, respectively, for OpenSSL 3.0. There appear to be implementations and specifications that require these longer lengths. See here for more information:
https://github.com/openssl/openssl/pull/12777
https://github.com/openssl/openssl/pull/12771

--------------------------------------
RFC9257 (draft-ietf-tls-external-psk-guidance-06)
--------------------------------------
Title               : Guidance for External Pre-Shared Key (PSK) Usage in TLS
Publication Date    : July 2022
Author(s)           : R. Housley, J. Hoyland, M. Sethi, C. A. Wood
Category            : INFORMATIONAL
Source              : Transport Layer Security
Stream              : IETF
Verifying Party     : IESG