File tree Expand file tree Collapse file tree 1 file changed +7
-7
lines changed Expand file tree Collapse file tree 1 file changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -1263,18 +1263,18 @@ able to inject these packets. Timing and packet retransmission information from
1263
1263
might be spoofed or altered.
1264
1264
1265
1265
Endpoints MUST NOT use an `ACK` frame in an unprotected packet to acknowledge
1266
- packets that were protected by 0-RTT or 1-RTT keys. An endpoint MUST ignore an
1267
- ` ACK` frame in an unprotected packet if it claims to acknowledge data that was
1268
- sent in a protected packet. Such an acknowledgement can only serve as a denial
1269
- of service, since an endpoint that can read protected data is always able to
1270
- send protected data.
1266
+ packets that were protected by 0-RTT or 1-RTT keys. An endpoint MUST treat
1267
+ receipt of an `ACK` frame in an unprotected packet that claims to acknowledge
1268
+ protected packets as a connection error of type OPTIMISTIC_ACK. An endpoint
1269
+ that can read protected data is always able to send protected data.
1271
1270
1272
1271
Note :
1273
1272
1274
1273
: 0-RTT data can be acknowledged by the server as it receives it, but any
1275
1274
packets containing acknowledgments of 0-RTT data cannot have packet protection
1276
- removed by the client until the entire server handshake is received by the
1277
- client.
1275
+ removed by the client until the TLS handshake is complete. The 1-RTT keys
1276
+ necessary to remove packet protection cannot be derived until the client
1277
+ receives all server handshake messages.
1278
1278
1279
1279
An endpoint SHOULD use data from `ACK` frames carried in unprotected packets or
1280
1280
packets protected with 0-RTT keys only during the initial handshake. All `ACK`
You can’t perform that action at this time.
0 commit comments