Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Initial secrets change after Retry #2870

Merged
merged 3 commits into from
Oct 31, 2019
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 8 additions & 4 deletions draft-ietf-quic-tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -767,8 +767,7 @@ TLS 1.3 (see {{initial-secrets}}).
## Initial Secrets {#initial-secrets}

Initial packets are protected with a secret derived from the Destination
Connection ID field from the client's first Initial packet of the
connection. Specifically:
Connection ID field from the client's Initial packet. Specifically:

~~~
initial_salt = 0x7fbcdb0e7c66bbe9193a96cd21519ebd7a02644a
Expand Down Expand Up @@ -800,8 +799,10 @@ modifying the contents of packets from future versions.
The HKDF-Expand-Label function defined in TLS 1.3 MUST be used for Initial
packets even where the TLS versions offered do not include TLS 1.3.

{{test-vectors-initial}} contains test vectors for the initial packet
encryption.
The secrets used for protecting Initial packets change when a server sends a
Retry packet to use the connection ID value selected by the server. The secrets
do not change when a client changes the Destination Connection ID it uses in
response to an Initial packet from the server.

Note:

Expand All @@ -811,6 +812,9 @@ Note:
that the server received its packet; the client has to rely on the exchange
that included the Retry packet for that property.

{{test-vectors-initial}} contains test vectors for the initial packet
encryption.


## AEAD Usage {#aead}

Expand Down