lsd0007

LSD0007: GNUnet communicators
Log | Files | Refs

commit 360cede2f64bfe98f9587795211605fb02d859dd
parent 95da98bf28e4c1a35ab3c873333291e5551bb4cc
Author: Pedram Fardzadeh <p.fardzadeh@protonmail.com>
Date:   Sat, 25 May 2024 18:26:13 +0200

Rephrased UDP Communicators second part

Diffstat:
Mdraft-gnunet-communicators.xml | 20++++++++++----------
1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/draft-gnunet-communicators.xml b/draft-gnunet-communicators.xml @@ -218,18 +218,18 @@ high-volume data transfer because a new key exchange is conducted for every packet. </t> <t> - Should however the target peer acknowledge the reception of a KX packet the resulting key can be re-used. - Such an ACK packet can be either send via a bi-directional UDP connection or a backchannel connection provided - by TRANSPORT. The wire format for such an KX packet is depicted in <xref target="figure_udp_ack"/>. - This will cause the communicator to offer a new queue (with a higher priority than the default queue) to - TRANSPORT with a limited capacity. The capacity is increased whenever the communicator receives an ACK for a - transmission. This queue is suitable for high-volume data transfer and TRANSPORT will prioritize this queue - if available. + If the target peer acknowledges the reception of a KX packet, the resulting key can be reused. Such an ACK + packet can be sent either via a bi-directional UDP connection or a backchannel connection provided by + TRANSPORT. The wire format for an ACK packet is depicted in <xref target="figure_udp_ack"/>. + This acknowledgment prompts the communicator to offer a new queue to TRANSPORT, which has a higher priority + than the default queue but starts with limited capacity. The capacity increases whenever the communicator + receives an ACK for a transmission. This queue is suitable for high-volume data transfer, and TRANSPORT + will prioritize it if available. </t> <t> - The initiating communicator tries to authenticate their peer ID (public key) in the first packets by signing - a monotonic time stamp, its peer ID, and the target peerID and send this data as well as the signature in - one of the first packets. Receivers should keep track (persist) of the monotonic time stamps for each + The initiating communicator attempts to authenticate its peer ID (public key) in the initial packets by signing + a monotonic time stamp, its peer ID, and the target peerID. This signed data, along with the signature, is sent + in one of the first packets. Receivers should keep track (persist) of the monotonic time stamps for each peer ID to reject possible replay attacks. </t>