<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Fri, Apr 22, 2016 at 5:25 AM, Trevor Perrin <span dir="ltr"><<a href="mailto:trevp@trevp.net" target="_blank">trevp@trevp.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">I'd also like to consider whether we should be more restrictive in<br>
what we allow as PSK inputs, so people don't misuse PSKs with<br>
low-entropy data, but I'll bring that up separately.<br></blockquote><div><br></div><div>"PSK's should be pseudorandom data with at least 256 bits of entropy. It is not recommended for PSK's to be based on human-typed passwords. But if they are, then the password together with a salt should be preprocessed with a KDF function like PBKDF2 or scrypt before using it as a PSK".<br></div></div><br></div><div class="gmail_extra">Cheers,<br><br></div><div class="gmail_extra">Rhys.<br><br></div></div>