Current draft has the following text in it: If any of these checks fail, the server MUST NOT respond with the extension and must discard all the remaining first flight data (thus falling back to 1-RTT). If the client attempts a 0-RTT handshake but the server rejects it, it will generally not have the 0-RTT record protection keys and must instead trial decrypt each record with the 1-RTT handshake keys until it finds one that decrypts properly, and then pick up the handshake from that point.
My understanding of that, in case client does 0-RTT but server rejects it (because the PSK is too old or its time is different enough) is that the server needs to keep on reading arbitrarily large amounts of data it has no idea what to do with. All using slow path (thinking exception handling in particular). Is my understanding correct? Why is there no limit on the amount of data that can be encrypted using PSK keys (0-RTT)? -- Regards, Hubert Kario Senior Quality Engineer, QE BaseOS Security team Web: www.cz.redhat.com Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls