Skip to content

Commit

Permalink
Merge pull request #4104 from ekr/forgery_warnings
Browse files Browse the repository at this point in the history
Add warning about request forgery and client-side migration. Fixes #4086
  • Loading branch information
janaiyengar committed Sep 22, 2020
2 parents 50b3b85 + b6bffb4 commit 7886e41
Showing 1 changed file with 13 additions and 0 deletions.
13 changes: 13 additions & 0 deletions draft-ietf-quic-transport.md
Original file line number Diff line number Diff line change
Expand Up @@ -6435,6 +6435,19 @@ implementation or deployment, without potential targets for request forgery
attacks taking action. However these countermeasures could be insufficient if
UDP-based services do not properly authorize requests.

Because the migration attack described in
{{request-forgery-with-spoofed-migration}} is quite powerful and does not have
adequate countermeasures, QUIC server implementations should assume that
attackers can cause them to generate arbitrary UDP payloads to arbitrary
destinations. QUIC servers SHOULD NOT be deployed in networks that also have
inadequately secured UDP endpoints.

Although it is not generally possible to ensure that clients are not co-located
with vulnerable endpoints, this version of QUIC does not allow servers to
migrate, thus preventing spoofed migration attacks on clients. Any future
extension which allows server migration MUST also define countermeasures for
forgery attacks.


### Control Options for Endpoints

Expand Down

0 comments on commit 7886e41

Please sign in to comment.