On Wed, Mar 30, 2016 at 3:57 PM, Martin Thomson <martin.thom...@gmail.com>
wrote:

> On 31 Mar 2016 5:56 AM, "Ilari Liusvaara" <ilariliusva...@welho.com>
> wrote:
> > Then on topic of 0-RTT, how does 0-RTT key hashes behave if
> > handshake is restarted (main handshake hash continues, but
> > 0-RTT hash context currently needs to be separate from the
> > main context)?
>
> Good question. I don't recall that being discussed. I see three options :
>
> 1. Continue the hash, just like in 1-RTT
>
> 2. Treat HelloRetryRequest as a denial of the entire first flight.
>
> 3. Signal the choice.
>
> Option 2 suits best if we consider HelloRetryRequest to be a DoS feature
> exclusively or at least primarily. But we have other reasons for it and I
> don't think that DoS mitigation is a big factor for TCP.
>

I believe Option #2 is simplest.

-Ekr

I think that option 1 is easy enough, since both sides have to extend the
> hash in any case. 3 is just complexity.
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to