The current section describes what a client should do when it faces a
HRR, and the referenced bullet point specifies how the HRR "key_share"
extension should be processed.

The errata suggests "clarifying" that point by adding:

> Note: A "key_share" extension may not be supplied in a
> HelloRetryRequest message when a server receives  an "early_data"
> (Section 4.2.10).

I interpret it as:

    If the client sends an "early_data" extension in its Client Hello,
    then the server responding with a HelloRetryRequest MAY include or
    omit the "key_share" extension in the HRR.

That is not a result that is unique to the presence of the "early_data".
Perhaps you misinterpreted the second bullet point in
https://tools.ietf.org/html/rfc8446#page-54

This report does not fix an error, and it adds only more confusion. I
suggest rejecting it.

Kind regards,
Peter

On Fri, Apr 24, 2020 at 02:49:54AM -0700, RFC Errata System wrote:
> The following errata report has been submitted for RFC8446,
> "The Transport Layer Security (TLS) Protocol Version 1.3".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid6127
> 
> --------------------------------------
> Type: Editorial
> Reported by: Ben Smyth <resea...@bensmyth.com>
> 
> Section: 4.1.2.
> 
> Original Text
> -------------
> If a "key_share" extension was supplied in the HelloRetryRequest,
> replacing the list of shares with a list containing a single
> KeyShareEntry from the indicated group.
> 
> Corrected Text
> --------------
> If a "key_share" extension was supplied in the HelloRetryRequest,
> replacing the list of shares with a list containing a single
> KeyShareEntry from the indicated group. Note: A "key_share" 
> extension may not be supplied in a HelloRetryRequest message 
> when a server receives  an "early_data" (Section 4.2.10).
> 
> Notes
> -----
> 
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC8446 (draft-ietf-tls-tls13-28)
> --------------------------------------
> Title               : The Transport Layer Security (TLS) Protocol Version 1.3
> Publication Date    : August 2018
> Author(s)           : E. Rescorla
> Category            : PROPOSED STANDARD
> Source              : Transport Layer Security
> Area                : Security
> Stream              : IETF
> Verifying Party     : IESG
> 
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to