ectly retransmits the missing messages, the connection
>>>> will perform suboptimally for a blip but still recover.
>>>>
>>>> David
>>>>
>>>>
>>>> On Tue, Apr 16, 2024, 05:19 Tschofenig, Hannes <
>>>> hannes.tscho
ing messages, the connection
>>> will perform suboptimally for a blip but still recover.
>>>
>>> David
>>>
>>>
>>> On Tue, Apr 16, 2024, 05:19 Tschofenig, Hannes <
>>> hannes.tschofe...@siemens.com> wrote:
>>>
>>>&
>
>>>
>>> this is great feedback. Give me a few days to respond to this issue with
>>> my suggestion for moving forward.
>>>
>>>
>>>
>>> Ciao
>>>
>>> Hannes
>>>
>>>
>>>
>>> *From:
oving forward.
>>
>>
>>
>> Ciao
>>
>> Hannes
>>
>>
>>
>> *From:* TLS *On Behalf Of *David Benjamin
>> *Sent:* Saturday, April 13, 2024 7:59 PM
>> *To:*
>> *Cc:* Nick Harper
>> *Subject:* Re: [TLS] Issues with buf
reat feedback. Give me a few days to respond to this issue with
> my suggestion for moving forward.
>
>
>
> Ciao
>
> Hannes
>
>
>
> *From:* TLS *On Behalf Of *David Benjamin
> *Sent:* Saturday, April 13, 2024 7:59 PM
> *To:*
> *Cc:* Nick Harper
> *Subje
Hi David,
this is great feedback. Give me a few days to respond to this issue with my
suggestion for moving forward.
Ciao
Hannes
From: TLS On Behalf Of David Benjamin
Sent: Saturday, April 13, 2024 7:59 PM
To:
Cc: Nick Harper
Subject: Re: [TLS] Issues with buffered, ACKed KeyUpdates in
Another issues with DTLS 1.3's state machine duplication scheme:
Section 8 says implementation must not send new KeyUpdate until the
KeyUpdate is ACKed, but it says nothing about other post-handshake
messages. Suppose KeyUpdate(5) in flight and the implementation decides to
send NewSessionTicket.