Giter Site home page Giter Site logo

Comments (6)

ianswett avatar ianswett commented on May 25, 2024

I'm not sure how we could come up with a good one-size fits all limit. Different deployment environments may be more or less capable of generating amplification attacks. There are things we can do with the design of QUIC, such as add the ability to pair a connection id to a resumption token, to make these less practical.

from base-drafts.

janaiyengar avatar janaiyengar commented on May 25, 2024

Is this amplification any worse than TFO + TLS1.3?

from base-drafts.

martinthomson avatar martinthomson commented on May 25, 2024

To @ianswett's point, if there isn't a one-size fits all number, then we need a set of guidelines. I explicitly didn't say that we needed a number in the problem description for that reason.

Is this amplification any worse than TFO + TLS1.3?

I don't know, no one has deployed that yet and so we don't know what we can do with the first flight with TFO (in TLS 1.3 or any other protocol for that matter). I expect that whatever guideline/number we arrive at will probably apply there.

TFO has a really unsatisfactory response to this problem: https://tools.ietf.org/html/rfc7413#section-5.2 I guess that's what you get with experimental RFCs.

from base-drafts.

janaiyengar avatar janaiyengar commented on May 25, 2024

@martinthomson I don't think this is a problem with TFO being experimental, I think it's a problem with too few security people paying attention to TFO. Either ways, yeah, let's make sure we solve this problem well in QUIC.

from base-drafts.

martinthomson avatar martinthomson commented on May 25, 2024

Not going to disagree with that!

(I will disagree with the potential implication that security is the responsibility of security people, but I'm sure that was not what you intended.)

from base-drafts.

janaiyengar avatar janaiyengar commented on May 25, 2024

@martinthomson Yes, didn't mean to imply that. I don't consider myself a "security person" but I've been quite bothered by the wishy-washy security requirements around TFO.

from base-drafts.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.