-
Notifications
You must be signed in to change notification settings - Fork 204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Retransmit server initial upon second Initial #3080
Changes from 1 commit
f51a23e
2e7bff7
18c9bba
ebb8543
20435cf
02080b7
f1c94bf
40cc163
b9c8423
6851dbb
bdcd8c7
1ae9869
91ced9e
fcfa095
e3b814d
0c9c2f7
2274b69
acd4454
3b52d6f
da00548
28959f9
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -511,7 +511,7 @@ Handshake or 1-RTT packets. | |
When a server receives duplicate CRYPTO data in an Initial packet after sending | ||
its Initial flight, it can assume the client did not receive all Initial CRYPTO | ||
data. To speed handshake completion, it SHOULD retransmit all unacknowledged | ||
Initial data subject to the path validation limits. After doing so, | ||
Initial CRYPTO data subject to the path validation limits. After doing so, | ||
the PTO is re-armed. | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Can we formulate duplicate crypto a bit more precise? Does it mean a valid crypto packet with the same packet number as seen before? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. By CRYPTO data, I meant data sent in CRYPTO frames, which is why I used uppercase for CRYPTO. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. There should never be a duplicate packet number unless the network duplicates packets. That's not a signal of anything on the client. I think the intent here is to act if the server receives CRYPTO frames that restate one or more already-received bytes. |
||
Prior to handshake completion, when few to none RTT samples have been | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The server can't arm the PTO prior to confirming that the path is valid.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The server can't send if it's limited by the amplification factor, but the PTO can be armed otherwise.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The way I read this, it says that you retransmit then you re-arm the PTO timer.
I think that you mean to say that when the path is validated, you can re-arm the PTO timer after retransmitting the CRYPTO data, but that's not what it says.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The PTO can be armed prior to path validation, but the text said it always was, which is wrong, so I reworded the paragraph.