On Sun, Sep 27, 2020, at 22:28, Michael D'Errico wrote: > > I'm afraid to keep reading....
In section 4, HandshakeType and Handshake are missing the value for the HelloRetryRequest message. Oh wait, never mind, it's the same value as ServerHello (?). Everything appears to be a hack within a hack.... If I hadn't already implemented TLS 1.0..1.2 I'd be completely lost reading RFC 8446. In fact I AM completely lost reading it. There's a mention of stateless HelloRetryRequest where the server sends a "cookie" containing a hash of the ClientHello. Is it supposed to rely on the client to echo this back? What if it doesn't? Or it puts in a different value? Or it gets modified in transit? Or it sends an initial ClientHello with a cookie extension as if it got a HelloRetryRequest? Am I worried about nothing here? OK, time for bed.... Mike _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls