On Sun, Sep 27, 2020, at 22:28, Michael D'Errico wrote:
> 
> I'm afraid to keep reading....

In section 4, HandshakeType and Handshake are missing the
value for the HelloRetryRequest message.

Oh wait, never mind, it's the same value as ServerHello (?).

Everything appears to be a hack within a hack....

If I hadn't already implemented TLS 1.0..1.2 I'd be completely
lost reading RFC 8446.  In fact I AM completely lost reading it.

There's a mention of stateless HelloRetryRequest where the
server sends a "cookie" containing a hash of the ClientHello.
Is it supposed to rely on the client to echo this back?  What
if it doesn't?  Or it puts in a different value?  Or it gets
modified in transit?  Or it sends an initial ClientHello with a
cookie extension as if it got a HelloRetryRequest?  Am I
worried about nothing here?

OK, time for bed....

Mike

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to