From e5bdbd236cd6f86cb61a1e6f5181d5cb81054cd1 Mon Sep 17 00:00:00 2001
From: ID Bot
Date: Sat, 17 Feb 2024 14:55:46 +0000
Subject: [PATCH] Script updating gh-pages from 4fbb9ea. [ci skip]
---
draft-ietf-tls-rfc8446bis.html | 2 +-
draft-ietf-tls-rfc8446bis.txt | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/draft-ietf-tls-rfc8446bis.html b/draft-ietf-tls-rfc8446bis.html
index 72df4da8..b1fa63c9 100644
--- a/draft-ietf-tls-rfc8446bis.html
+++ b/draft-ietf-tls-rfc8446bis.html
@@ -8748,7 +8748,7 @@
clients and/or servers across connections. Use of the
Encrypted Client Hello [I-D.ietf-tls-esni] extension can
mitigate this risk, as can mechanisms external to TLS that
-rotate the PSK identity.¶
+rotate or encrypt the PSK identity.¶
diff --git a/draft-ietf-tls-rfc8446bis.txt b/draft-ietf-tls-rfc8446bis.txt
index afe8b0ef..94c606ca 100644
--- a/draft-ietf-tls-rfc8446bis.txt
+++ b/draft-ietf-tls-rfc8446bis.txt
@@ -6075,7 +6075,7 @@ C.4. Client and Server Tracking Prevention
will generally be possible for an external observer to track clients
and/or servers across connections. Use of the Encrypted Client Hello
[I-D.ietf-tls-esni] extension can mitigate this risk, as can
- mechanisms external to TLS that rotate the PSK identity.
+ mechanisms external to TLS that rotate or encrypt the PSK identity.
C.5. Unauthenticated Operation