From e5bdbd236cd6f86cb61a1e6f5181d5cb81054cd1 Mon Sep 17 00:00:00 2001 From: ID Bot Date: Sat, 17 Feb 2024 14:55:46 +0000 Subject: [PATCH] Script updating gh-pages from 4fbb9ea. [ci skip] --- draft-ietf-tls-rfc8446bis.html | 2 +- draft-ietf-tls-rfc8446bis.txt | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/draft-ietf-tls-rfc8446bis.html b/draft-ietf-tls-rfc8446bis.html index 72df4da8..b1fa63c9 100644 --- a/draft-ietf-tls-rfc8446bis.html +++ b/draft-ietf-tls-rfc8446bis.html @@ -8748,7 +8748,7 @@

clients and/or servers across connections. Use of the Encrypted Client Hello [I-D.ietf-tls-esni] extension can mitigate this risk, as can mechanisms external to TLS that -rotate the PSK identity.

+rotate or encrypt the PSK identity.

diff --git a/draft-ietf-tls-rfc8446bis.txt b/draft-ietf-tls-rfc8446bis.txt index afe8b0ef..94c606ca 100644 --- a/draft-ietf-tls-rfc8446bis.txt +++ b/draft-ietf-tls-rfc8446bis.txt @@ -6075,7 +6075,7 @@ C.4. Client and Server Tracking Prevention will generally be possible for an external observer to track clients and/or servers across connections. Use of the Encrypted Client Hello [I-D.ietf-tls-esni] extension can mitigate this risk, as can - mechanisms external to TLS that rotate the PSK identity. + mechanisms external to TLS that rotate or encrypt the PSK identity. C.5. Unauthenticated Operation