Some problems with TLS 1.3 and PSK

Alan DeKok aland at deployingradius.com
Mon Jan 14 22:12:50 CET 2019


On Jan 14, 2019, at 2:16 PM, Alejandro Pérez Méndez <alex at um.es> wrote:
> But when psk_query you don't need to specify psk_identity. It is just used in the query as a parameter.
> 
>                 psk_query = "%{psksql:select hex(key) from psk_keys where keyid = '%{TLS-PSK-Identity}'}"

  The point is that psk_query extends the functionality of psk_identity.  And if psk_identity precluded using certs, the same could be said for psk_query.

>>   If the goal is to allow psk_query && certs at the same time, then I'd like to know why / how this works.  It may then also be useful to allow psk_identity && certs at the same time, too.
>> 
>>   See the latest code.  It should forbid the offending configuration, and therefore work by default.  If you need PSK && certs, then there's one check which can be deleted or commented out.  And then PSK && certs should be allow for *both* psk_query && psk_identity.
> 
> Having a TLS server supporting both, PSK and certs, at the same time is very convenient. In our case, Trust Router-based connections (that is, inter-realm ones), are always PSK based.
> But we offer a RADSEC-based proxy to our services, and that connection is based on certificates, not in Moonshot.

  Makes sense, I guess.  I just wasn't sure about the interaction between PSK && certs.  OpenSSL is magical that way.

> So, with the same "listen" directive we handle both. (see the abfab-tls site as an example where both are configured at the same time).

  OK.  I'll remove that restriction, then,

> I guess that we could split them using different ports for each, but then we'd need to use a non-standard port for one of them.

  No, I'll just fix the code.

  v3.0.x should then be able to use psk_query just fine...

  Alan DeKok.




More information about the Freeradius-Devel mailing list