Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

never allow 0-RTT when using Dial, even if the session ticket allows it #4125

Merged
merged 1 commit into from Oct 25, 2023

Conversation

marten-seemann
Copy link
Member

@marten-seemann marten-seemann commented Oct 24, 2023

Depends on #4120.

When resuming a TLS session using Dial (and not DialEarly), 0-RTT should be disabled at the TLS layer, even if the session ticket allows for 0-RTT resumption.

This bug is not critical, since Dial doesn't return an EarlyConnection, so the client wouldn't be able to actually send 0-RTT data in practice.

@codecov
Copy link

codecov bot commented Oct 24, 2023

Codecov Report

Merging #4125 (4f52dfd) into master (30f9c01) will increase coverage by 0.01%.
Report is 1 commits behind head on master.
The diff coverage is 91.67%.

❗ Current head 4f52dfd differs from pull request most recent head 0794d11. Consider uploading reports for the commit 0794d11 to get more accurate results

@@            Coverage Diff             @@
##           master    #4125      +/-   ##
==========================================
+ Coverage   83.74%   83.74%   +0.01%     
==========================================
  Files         150      150              
  Lines       15421    15429       +8     
==========================================
+ Hits        12913    12921       +8     
  Misses       2010     2010              
  Partials      498      498              
Files Coverage Δ
internal/handshake/crypto_setup.go 58.17% <100.00%> (+0.45%) ⬆️
internal/qtls/client_session_cache.go 61.36% <100.00%> (+2.83%) ⬆️
internal/qtls/go121.go 56.84% <100.00%> (ø)
internal/qtls/go120.go 28.17% <0.00%> (ø)

@marten-seemann marten-seemann changed the base branch from integration-tests-typed-atomics to master October 25, 2023 04:46
When resuming a TLS session using Dial (and not DialEarly), 0-RTT should
be disabled at the TLS layer, even if the session ticket allows for
0-RTT resumption.

This bug is not critical, since Dial doesn't return an EarlyConnection,
so the client wouldn't be able to actually send 0-RTT data in practice.
internal/handshake/crypto_setup.go Show resolved Hide resolved
@marten-seemann marten-seemann merged commit 746290b into master Oct 25, 2023
62 checks passed
@marten-seemann marten-seemann deleted the no-0rtt-on-dial branch October 27, 2023 04:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants