@@ -68,16 +68,6 @@ Enabling TLS to address this use case effectively requires the TLS
6868handshake to execute a password-authenticated key establishment
6969(PAKE) protocol. This document describes a TLS extension `pake`
7070that can carry data necessary to execute a PAKE.
71- {{Section 9.2 of !TLS13=RFC8446}} specifies that a valid Client
72- Hello must include either a `pre_shared_key` extension or both
73- a `signature_algorithms` and `supported_groups` extension. With the
74- addition of the `pake` extension specified here, the new requirement
75- is that a valid Client Hello must satisfy at least one of the
76- following options :
77-
78- * includes a `pre_shared_key` extension
79- * includes both a `signature_algorithms` and `supported_groups` extensions
80- * includes a `pake` extension
8171
8272This extension is generic, in that it can be used to carry key
8373exchange information for multiple different PAKEs. We assume that
@@ -174,6 +164,17 @@ the handshake. For instance, if a client knows a password but not which
174164PAKE the server supports it could send corresponding PAKEShares for each
175165PAKE.
176166
167+ {{Section 9.2 of !TLS13=RFC8446}} specifies that a valid ClientHello
168+ must include either a `pre_shared_key` extension or both
169+ a `signature_algorithms` and `supported_groups` extension. With the
170+ addition of the `pake` extension specified here, the new requirement
171+ is that a valid ClientHello must satisfy at least one of the
172+ following options :
173+
174+ * includes a `pre_shared_key` extension
175+ * includes both a `signature_algorithms` and `supported_groups` extensions
176+ * includes a `pake` extension
177+
177178If a client sends the `pake` extension, then it MAY also send the
178179` key_share` and `pre_shared_key` extensions, to allow the server to
179180choose an authentication mode. Unlike PSK-based authentication,
0 commit comments