Skip to main content

Questions tagged [psk]

The tag has no usage guidance.

1 vote
1 answer
26 views

what should be the response of keyupdate if the initial KeyUpdateRequest is set to update_not_requested not update_requested

"The KeyUpdate handshake message is used to indicate that the sender is updating its sending cryptographic keys." "If the request_update field is set to "update_requested", ...
hjhjh's user avatar
  • 41
1 vote
1 answer
53 views

In TLS1.3 can the client hello have the extensions which were not sent as part of HelloRetryRequest

I am having a Handshake session of PSK_only mode in TLS1.3 , where I use PSK's established out of band. consider, client Hello is sent with the extensions of supported_versions, PreSharedKey, ...
hjhjh's user avatar
  • 41
0 votes
1 answer
49 views

Anlyzing PSK-TLS handshake (Handshake Finished record) in Wireshark

I am doing testing with some ethernet device, for which I use an own TLS implementation (using OpenSSL for the actual cryptographic functions). There are pre shared keys used. When I am connecting to ...
seesharp's user avatar
1 vote
2 answers
121 views

Authenticating a device for remote motor control

I'm looking for a standard solution to the following problem. I've been unable to find how something like this is normally accomplished. Even a key word that points me in the right direction would be ...
Joseph Rappaport's user avatar
0 votes
1 answer
587 views

TLS session ticket vs pre-shared key state management

TLS 1.2 session tickets are encrypted by the server with the session ticket encryption key (STEK). This key is shared with all the servers doing TLS termination. The session ticket contains all the ...
user2233706's user avatar
1 vote
3 answers
458 views

How to build a PSK website

Pre-Shared Key (PSK) with simple symmetric encryption is a popular way of solving both client and server authentication when SSL cannot be used for some reason (for example, can't trust or deal with ...
personal_cloud's user avatar
2 votes
1 answer
333 views

Why does EAP-TLS 1.3 not allow for PSK authentication?

EAP-TLS with TLS 1.3 is standardized in RFC 9190. Section 2.1.1 specifies Authentication. The RFC states that PSK authentication shall not be used except for resumption. This is surprising, because ...
Mark Thomas's user avatar
2 votes
3 answers
2k views

I don't understand TLS 1.3 allowing PSK

TLS 1.3 removes the use of non-ephemeral Diffie-Hellman, which is great! But it still allows PSK. I'm not as familiar with PSK configuration but wouldn't that mean TLS 1.3 still is allowing the use of ...
HeadphoneHaxZ's user avatar
0 votes
1 answer
570 views

Is there a point in randomizing my WPA2-Personal SSID (meaning, set a random string in place of the SSID)?

I was looking for ways to make Wi-Fi that uses WPA2-Personal/WPA-PSK secure, and I stumbled in this answer (the second one, from Terrence Koeman): WPA2-PSK (aka WPA2 Personal) basically does the same ...
re.sole's user avatar
2 votes
2 answers
1k views

How are PSKs agreed upon by the TLS server and client?

I've read that pre-shared keys (PSKs) are symmetric keys shared in advance among communicating parties but have found no explanation as to how the TLS client and server agree upon the value of the PSK....
Michael's user avatar
  • 23
0 votes
0 answers
358 views

How to identify a unidentified PSK wifi encryption

I have an unidentified PSK encryption in airodump's output (see red square on screenshot) and I would like to get more information about the encryption method used by the network: do you know any tool ...
John Kravicz's user avatar
4 votes
1 answer
6k views

Using PSK between an openssl server and client

I'm trying to create a connection between an openssl server and client on my machine using ECDHE-PSK-AES256-CBC-SHA384 What am I doing wrong with these commands? openssl s_server -cipher ECDHE-PSK-...
Philippe's user avatar
  • 215
2 votes
1 answer
346 views

IPsec with PSK: Can PSK be used for passive eavesdroping?

I use a PSK to connect to an IPsec VPN. Let's say an attacker can gain access to my PSK. He can then impersonate me, that much is clear. But would she also be able to decrypt intercepted traffic? ...
manduca's user avatar
  • 1,111