From afe2308fa0602ab07a734b499e03d9bd47bb768f Mon Sep 17 00:00:00 2001
From: ID Bot
Date: Thu, 5 Oct 2023 21:23:21 +0000
Subject: [PATCH] Script updating gh-pages from 1260203. [ci skip]
---
draft-irtf-cfrg-opaque.html | 5 +++--
draft-irtf-cfrg-opaque.txt | 6 ++++--
2 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/draft-irtf-cfrg-opaque.html b/draft-irtf-cfrg-opaque.html
index 13d36233..9c3f2dcd 100644
--- a/draft-irtf-cfrg-opaque.html
+++ b/draft-irtf-cfrg-opaque.html
@@ -3327,7 +3327,7 @@
the client password as input to the OPRF for registration and authentication.
However, if client_identity
can be bound to the client's registration record
(in that the identity will not change during the lifetime of the record),
-then an implementation can incorporate client_identity
alongside the
+then an implementation SHOULD incorporate client_identity
alongside the
password as input to the OPRF. This provides additional client-side entropy
which can supplement the entropy that should be introduced by the server during
an honest execution of the protocol. This also provides domain separation
@@ -3699,7 +3699,8 @@
key-robustness, whereas HMAC with a collision-resistant hash function does
satisfy key-robustness.¶
An application can choose to use a non-key-robust MAC within the AKE portion of
-the protocol described in Section 6.4.¶
+the protocol described in Section 6.4, but it MUST use a key-robust MAC
+for the creation of the auth_tag
parameter in Section 4.1.2.¶
diff --git a/draft-irtf-cfrg-opaque.txt b/draft-irtf-cfrg-opaque.txt
index 554b8298..2ca32ac8 100644
--- a/draft-irtf-cfrg-opaque.txt
+++ b/draft-irtf-cfrg-opaque.txt
@@ -1788,7 +1788,7 @@ def AuthServerRespond(cleartext_credentials, server_private_key, client_public_k
client password as input to the OPRF for registration and
authentication. However, if client_identity can be bound to the
client's registration record (in that the identity will not change
- during the lifetime of the record), then an implementation can
+ during the lifetime of the record), then an implementation SHOULD
incorporate client_identity alongside the password as input to the
OPRF. This provides additional client-side entropy which can
supplement the entropy that should be introduced by the server during
@@ -2163,7 +2163,9 @@ def AuthServerRespond(cleartext_credentials, server_private_key, client_public_k
resistant hash function does satisfy key-robustness.
An application can choose to use a non-key-robust MAC within the AKE
- portion of the protocol described in Section 6.4.
+ portion of the protocol described in Section 6.4, but it MUST use a
+ key-robust MAC for the creation of the auth_tag parameter in
+ Section 4.1.2.
10.8. Input Validation