<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Sun, Apr 24, 2016 at 10:43 AM, Alex <span dir="ltr"><<a href="mailto:alex@centromere.net" target="_blank">alex@centromere.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I fear that your changes would emulsify the protocol stack. By making<br>
the protocol say, "Perform EncryptAndHash(payload) for all tokens<br>
EXCEPT this one", it adds special cases and exceptions that make the<br>
code more complex and more difficult to audit.<br></blockquote><div><br></div><div>Fair enough. A proper payload can be included on the first packet but if fallback occurs then the MAC value cannot be verified and the contents cannot be decrypted by the responder. I thought it would be easier to forbid the non-decryptable payload completely but perhaps not.<br><br>The higher layers of the protocol stack still need to be able to recognize "did not decrypt: ignore this payload and continue" so I'm not sure that it would eliminate the special case handling completely.<br><br></div><div>Cheers,<br><br></div><div>Rhys.<br></div><div><br></div></div></div></div>