-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keeping losing ACK for Handshake packet leads 0 cwnd #2779
Comments
If the handshake cannot make progress here, perhaps it is better to give up? |
It could, but why not reclaim data credit by making CRYPTO data lost? |
I think the CRYPTO retransmissions are intended to be analogous to PTOs. For PTOs, we only declare any packet lost when we receive an acknowledgement. |
Marten is correct. It's on my TODO list to try to merge these mechanisms(redo of #2655), but it takes very careful thought and that PR quickly became conflict-heavy. |
As discussed on #2984, this is fixed in the editor's copy. |
So timer expiration does not remove in-flight unacknowleged CRYPTO data from bytes_in_flight. This means if ACK continues to be lost for Handshake packet, endpoint has no cwnd left to send any packet. loss time based detection does not kick in because no ACK is received.
The text was updated successfully, but these errors were encountered: