Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

describe how 0-RTT is accepted and rejected #2841

Merged
merged 16 commits into from Aug 16, 2019
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
4 changes: 2 additions & 2 deletions draft-ietf-quic-tls.md
Expand Up @@ -621,8 +621,8 @@ as a connection error of type PROTOCOL_VIOLATION.
## Accepting and rejecting 0-RTT
marten-seemann marked this conversation as resolved.
Show resolved Hide resolved

A server accepts 0-RTT by sending the EarlyDataIndication in the ServerHello
marten-seemann marked this conversation as resolved.
Show resolved Hide resolved
(see Section 4.10.2 of {{!TLS13}}). A server that accepts 0-RTT MUST process and
acknowledge all 0-RTT packets that it receives.
(see Section 4.10.2 of {{!TLS13}}). The server then processes and acknowledges
marten-seemann marked this conversation as resolved.
Show resolved Hide resolved
the 0-RTT packets that it receives.

A server rejects 0-RTT by sending a ServerHello without the EarlyDataIndication.
marten-seemann marked this conversation as resolved.
Show resolved Hide resolved
A server will always reject 0-RTT if it sends a TLS HelloRetryRequest. When
Expand Down