From f529d05ba87f57d6aa3f7d3b987300296f69b282 Mon Sep 17 00:00:00 2001 From: Martin Thomson Date: Wed, 13 Feb 2019 11:16:38 +1100 Subject: [PATCH 1/2] Only applications know what can be retried Closes #2150. --- draft-ietf-quic-transport.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/draft-ietf-quic-transport.md b/draft-ietf-quic-transport.md index a5c3320fb9..d169b7bff9 100644 --- a/draft-ietf-quic-transport.md +++ b/draft-ietf-quic-transport.md @@ -2211,7 +2211,9 @@ endpoint. An endpoint that sends packets near the end of the idle timeout period of a peer risks having those packets discarded if its peer enters the draining state before the packets arrive. If a peer could timeout within an Probe Timeout (PTO, see Section 6.2.2 of {{QUIC-RECOVERY}}), it is advisable to -test for liveness before sending any data that cannot be retried safely. +test for liveness before sending any data that cannot be retried safely. Note +that it is likely that only application protocols or using applications will +know what information can be retried. ## Immediate Close From 51cfe3c3ba82ba397a9d8bbb013a1677fbda1796 Mon Sep 17 00:00:00 2001 From: Jana Iyengar Date: Sat, 23 Feb 2019 19:36:59 -0800 Subject: [PATCH 2/2] applications or protocols Reverse the two for readability. Co-Authored-By: martinthomson --- draft-ietf-quic-transport.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/draft-ietf-quic-transport.md b/draft-ietf-quic-transport.md index d169b7bff9..b2563aa7ae 100644 --- a/draft-ietf-quic-transport.md +++ b/draft-ietf-quic-transport.md @@ -2212,7 +2212,7 @@ period of a peer risks having those packets discarded if its peer enters the draining state before the packets arrive. If a peer could timeout within an Probe Timeout (PTO, see Section 6.2.2 of {{QUIC-RECOVERY}}), it is advisable to test for liveness before sending any data that cannot be retried safely. Note -that it is likely that only application protocols or using applications will +that it is likely that only applications or application protocols will know what information can be retried.