Skip to content

Commit

Permalink
Forbid Handshake key discarding
Browse files Browse the repository at this point in the history
After many iterations of solutions to this problem, we have decided to
first forbid discard.  We would like to have a concrete discard point,
but we couldn't agree on one that was provably safe.

If we can come up with a mechanism for discarding earlier, or a signal
that comes earlier than the end of the connection, we will first
carefully look at it, but we might accept further changes.

Closes #2863.
  • Loading branch information
martinthomson committed Oct 17, 2019
1 parent 8bd39d9 commit e686f9e
Showing 1 changed file with 2 additions and 8 deletions.
10 changes: 2 additions & 8 deletions draft-ietf-quic-tls.md
Expand Up @@ -760,14 +760,8 @@ and ignoring any outstanding Initial packets.

### Discarding Handshake Keys

An endpoint MUST NOT discard its handshake keys until the TLS handshake is
confirmed ({{handshake-confirmed}}). An endpoint SHOULD discard its handshake
keys as soon as it has confirmed the handshake. Most application protocols
will send data after the handshake, resulting in acknowledgements that allow
both endpoints to discard their handshake keys promptly. Endpoints that do
not have reason to send immediately after completing the handshake MAY send
ack-eliciting frames, such as PING, which will cause the handshake to be
confirmed when they are acknowledged.
An endpoint MUST NOT discard its handshake keys. Discarding Handshake keys too
early can lead to deadlock conditions.


### Discarding 0-RTT Keys
Expand Down

0 comments on commit e686f9e

Please sign in to comment.