Re: [TLS] RFC 8446 Early data, server response: deprotect vs. type checking

2020-04-30 Thread Eric Rescorla
On Thu, Apr 30, 2020 at 2:46 AM Ben Smyth wrote: > Section 4.2.10 requires a server receiving early data to behave in ways >>> including (p53): >>> >>> * Ignore the extension and return a regular 1-RTT response. The server >>> then skips past early data by attempting to deprotect received

Re: [TLS] RFC 8446 Early data, server response: deprotect vs. type checking

2020-04-30 Thread Ben Smyth
> > Section 4.2.10 requires a server receiving early data to behave in ways >> including (p53): >> >> * Ignore the extension and return a regular 1-RTT response. The server >> then skips past early data by attempting to deprotect received records >> using the handshake traffic key, discarding

Re: [TLS] RFC 8446 Early data, server response: deprotect vs. type checking

2020-04-29 Thread Eric Rescorla
Hi Ben, Thanks for your note and for your efforts on the tutorial! On Wed, Apr 29, 2020 at 5:43 AM Ben Smyth wrote: > Section 4.2.10 requires a server receiving early data to behave in ways > including (p53): > > * Ignore the extension and return a regular 1-RTT response. The server > then