Skip to content

Commit

Permalink
Kazuho's suggestion
Browse files Browse the repository at this point in the history
About being able to unprotect the Initial packet
  • Loading branch information
ianswett committed Nov 1, 2019
1 parent f827ca3 commit 9617e1d
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions draft-ietf-quic-transport.md
Original file line number Diff line number Diff line change
Expand Up @@ -1641,12 +1641,12 @@ of connection establishment. By giving the client a different connection ID to
use, a server can cause the connection to be routed to a server instance with
more resources available for new connections.

If a server receives a client Initial with an invalid Retry token,
it knows the client will not accept another Retry token. It can either
proceed with the handshake without verifying the token or immediately close
({{immediate-close}}) the connection with an connection error of
INVALID_TOKEN to cause the handshake to fail quickly instead of waiting
for the client to timeout.
If a server receives a client Initial that can be unprotected but contains an
invalid Retry token, it knows the client will not accept another Retry token.
It can either proceed with the handshake without verifying the token or
immediately close ({{immediate-close}}) the connection with an connection

This comment has been minimized.

Copy link
@mikkelfj

mikkelfj Nov 1, 2019

Contributor

with a connection

(not sure why suggestions sometimes work, sometimes not)

This comment has been minimized.

Copy link
@ianswett

ianswett Nov 1, 2019

Author Contributor

Suggestions only work on PRs, not individual commits.

error of INVALID_TOKEN to cause the handshake to fail quickly instead of
waiting for the client to timeout.

A flow showing the use of a Retry packet is shown in {{fig-retry}}.

Expand Down

0 comments on commit 9617e1d

Please sign in to comment.