tls1.3中的配置psk_ke(仅PSK)模式
我使用openssl 1.1.1,并尝试仅在通过s_client生成的请求中配置psk_ke(仅PSK)模式。在我的请求中,在客户端Hello消息中,我无法抑制PSK_DHK_KE模式,我认为默认情况下会添加它。
我在s_client请求中使用了指令-allow_no_dhe_kex。它仅有助于在数据包中添加PSK_KE模式。
此外,在客户端Hello Message中添加了EC_POINT格式,键共享,签名算法的选项,我认为client Hello中包含的psk_dhk_ke选项。如果我错了,请纠正我的理解。
PSK_DHE_KE可以在客户端Hello中与EC_POINT格式,密钥共享,签名算法抑制吗?
TLS1.3客户端Hello消息:
I am using openssl 1.1.1 and trying to configure psk_ke (PSK-only) mode only in requests generated through s_client. In my requests, in client hello message, I am not able to suppress psk_dhk_ke mode, which I think is getting added by default.
I have used directive -allow_no_dhe_kex in s_client requests. It is only helping to get the psk_ke mode added in the packet.
Also the options like ec_point format, key share, signature algorithms are added in the client hello message which I think is due to psk_dhk_ke option included in client hello. Please correct my understanding if I am wrong.
Can psk_dhe_ke be suppressed in client hello along with ec_point format, key share, signature algorithms?
TCP dump of TLS1.3 client hello message:
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
使用TLSV1.3时,目前不可能使用OpenSSL抑制PSK_DHE_KE。 “ -allow_no_dhe_kex”选项仅允许对等式选择NO-DHE版本,但不会抑制发送DHE选项。
在某些情况下,可以抑制OpenSSL中的EC_POINT_FORMATS,signature_algorithms和key_share扩展,但如果您打算执行TLSV1.3。如果您想做TLSV1.3,则将始终发送它们。
It is not currently possible to suppress psk_dhe_ke with OpenSSL when using TLSv1.3. The "-allow_no_dhe_kex" option only allows the peer to select the no-dhe version, but doesn't suppress sending the dhe option.
It is possible to suppress the ec_point_formats, signature_algorithms and key_share extensions in OpenSSL under certain circumstances - but not if you plan to do TLSv1.3. If you want to do TLSv1.3 then they will always be sent.