Skip to content

External DDoS Support for Retry Token Timestamp Disablement #5006

Open
@kmmago

Description

@kmmago

Describe the feature you'd like supported

MsQuic Retry Token mechanism uses Timestamp to identify the Key phase. Ask is to make use of Timestamp as an option that can be disabled i.e. if disabled timestamp is not used to get key phase, but rather all active keys (currently 2) are used to decrypt.

Proposed solution

For Ddos and MsQuic shared key Retry Token mechanism to work effectively, it is crucial that the two systems are clock synchronized. This should not be an issue for solutions running within Azure as NTP should take care of that, but can we make this configurable so that it can be disabled when any discrepancies are found with clock synchronization and it starts affecting customers because ddos generated tokens are not correctly verified by msquic server because of drift in timestamps.

Additional context

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    Area: APIArea: CoreRelated to the shared, core protocol logicArea: SecurityRelated to security or quality testingfeature requestA request for new functionality

    Type

    Projects

    Status

    Planned

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions