Skip to content

Commit

Permalink
Try again
Browse files Browse the repository at this point in the history
  • Loading branch information
martinthomson committed May 22, 2019
1 parent 5201e2e commit b645d79
Showing 1 changed file with 9 additions and 7 deletions.
16 changes: 9 additions & 7 deletions draft-ietf-quic-transport.md
Expand Up @@ -2477,13 +2477,15 @@ that is reset by revealing the Stateless Reset Token MUST NOT be reused for new
connections at nodes that share a static key.

The same Stateless Reset Token MAY be used for multiple connection IDs on the
same connection. An endpoint that reuses a Stateless Reset Token MUST ensure
that packets with Destination Connection ID field values that correspond to a
reused Stateless Reset Token are attributed to the same connection, even when
the connection ID has been retired. Otherwise, an attacker might be able to
send a packet with a retired connection ID and cause the endpoint to produce a
Stateless Reset that it can use to disrupt the connection; just as with the
attacks in {{reset-oracle}}.
same connection. However, reuse of a Stateless Reset Token might expose an
endpoint to denial of service if associated connection IDs are forgotten while
the associated token is still active at a peer. An endpoint MUST ensure that
packets with Destination Connection ID field values that correspond to a reused
Stateless Reset Token are attributed to the same connection as long as the
Stateless Reset Token is still usable, even when the connection ID has been
retired. Otherwise, an attacker might be able to send a packet with a retired
connection ID and cause the endpoint to produce a Stateless Reset that it can
use to disrupt the connection; just as with the attacks in {{reset-oracle}}.

Note that Stateless Reset packets do not have any cryptographic protection.

Expand Down

0 comments on commit b645d79

Please sign in to comment.