Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

clarify what happens when consuming CIDs excessively #2428

16 changes: 10 additions & 6 deletions draft-ietf-quic-transport.md
Expand Up @@ -961,12 +961,16 @@ cannot expect its peer to store and use all issued connection IDs.
An endpoint SHOULD ensure that its peer has a sufficient number of available and
unused connection IDs. While each endpoint independently chooses how many
connection IDs to issue, endpoints SHOULD provide and maintain at least eight
connection IDs. The endpoint SHOULD do this by always supplying a new
connection ID when a connection ID is retired by its peer or when the endpoint
receives a packet with a previously unused connection ID. Endpoints that
initiate migration and require non-zero-length connection IDs SHOULD provide
their peers with new connection IDs before migration, or risk the peer closing
the connection.
connection IDs. The endpoint SHOULD do this by supplying a new connection ID
when a connection ID is retired by its peer or when the endpoint receives a
packet with a previously unused connection ID. However, it MAY limit the
frequency or the total number of connection IDs issued for each connection to
avoid the risk of running out of connection IDs (see {{reset-token}}).

An endpoint that initiates migration and requires non-zero-length connection IDs
SHOULD ensure that the pool of connection IDs available to its peer allows the
peer to use a new connection ID on migration, as the peer will close the
connection if the pool is exhausted.


### Consuming and Retiring Connection IDs {#retiring-cids}
Expand Down