Skip to content

Commit d19b7f8

Browse files
committed
Harder again
1 parent 230589f commit d19b7f8

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

draft-ietf-quic-tls.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1263,18 +1263,18 @@ able to inject these packets. Timing and packet retransmission information from
12631263
might be spoofed or altered.
12641264

12651265
Endpoints MUST NOT use an `ACK` frame in an unprotected packet to acknowledge
1266-
packets that were protected by 0-RTT or 1-RTT keys. An endpoint MUST ignore an
1267-
`ACK` frame in an unprotected packet if it claims to acknowledge data that was
1268-
sent in a protected packet. Such an acknowledgement can only serve as a denial
1269-
of service, since an endpoint that can read protected data is always able to
1270-
send protected data.
1266+
packets that were protected by 0-RTT or 1-RTT keys. An endpoint MUST treat
1267+
receipt of an `ACK` frame in an unprotected packet that claims to acknowledge
1268+
protected packets as a connection error of type OPTIMISTIC_ACK. An endpoint
1269+
that can read protected data is always able to send protected data.
12711270

12721271
Note:
12731272

12741273
: 0-RTT data can be acknowledged by the server as it receives it, but any
12751274
packets containing acknowledgments of 0-RTT data cannot have packet protection
1276-
removed by the client until the entire server handshake is received by the
1277-
client.
1275+
removed by the client until the TLS handshake is complete. The 1-RTT keys
1276+
necessary to remove packet protection cannot be derived until the client
1277+
receives all server handshake messages.
12781278

12791279
An endpoint SHOULD use data from `ACK` frames carried in unprotected packets or
12801280
packets protected with 0-RTT keys only during the initial handshake. All `ACK`

0 commit comments

Comments
 (0)