Skip to content

Commit

Permalink
Merge pull request #8 from yaroslavros/sslkeylog
Browse files Browse the repository at this point in the history
Added relevant SSLKEYLOGFILE labels
  • Loading branch information
tireddy2 authored Oct 10, 2024
2 parents 3f72764 + 434b79f commit 09e31f1
Showing 1 changed file with 21 additions and 0 deletions.
21 changes: 21 additions & 0 deletions draft-tschofenig-tls-extended-key-update.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,6 +60,7 @@ informative:
RFC7296:
RFC7624:
I-D.ietf-tls-hybrid-design:
I-D.ietf-tls-keylogfile:
ANSSI-DAT-NT-003:
author:
org: ANSSI
Expand Down Expand Up @@ -440,6 +441,26 @@ is the concatenation of the key_exchange field for each of the algorithms.
The same approach is then re-used in the extended key update when
key shares are exchanged.

# SSLKEYLOGFILE update

As Extended Key Update invalidates previous secrets, SSLKEYLOGFILE {{I-D.ietf-tls-keylogfile}} needs to
be populated with new entries. Each completed Extended Key Update results
in two additional secret labels in SSLKEYLOGFILE:

1. `CLIENT_TRAFFIC_SECRET_N+1`: identified as client_application_traffic_secret_N+1 in the key schedule

2. `SERVER_TRAFFIC_SECRET_N+1`: identified as server_application_traffic_secret_N+1 in the key schedule

Similarly to other records in SSLKEYLOGFILE label is followed by 32-byte value
of the Random field from the ClientHello message that established the TLS
connection and corresponding secret encoded in hexadecimal.

SSLKEYLOGFILE entries for Extended Key Update MUST NOT be produced if
SSLKEYLOGFILE was not used for other secrets in the handshake.

Note that each successful Extended Key Update invalidates all previous SSLKEYLOGFILE secrets including
past iterations of `CLIENT_TRAFFIC_SECRET_` and `SERVER_TRAFFIC_SECRET_`.

# Security Considerations

This entire document is about security.
Expand Down

0 comments on commit 09e31f1

Please sign in to comment.