Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No spoofed ACK attack #2188

Merged
merged 2 commits into from Dec 16, 2018
Merged

No spoofed ACK attack #2188

merged 2 commits into from Dec 16, 2018

Conversation

janaiyengar
Copy link
Contributor

... but there is an amplification one.

Closes #2160.

to acquire that token. At a later time, the attacker may initiate a 0-RTT
connection with a server by spoofing this same address, which might now address
a different (victim) endpoint. The attacker can thus potentially cause the
server to send an initial window's worth of data towards the victim.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/initial window's/initial congestion window/

Copy link
Member

@martinthomson martinthomson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is two changes. But I like both of them.

@janaiyengar janaiyengar merged commit 196dfe5 into master Dec 16, 2018
@martinthomson martinthomson added editorial An issue that does not affect the design of the protocol; does not require consensus. -transport labels Dec 18, 2018
@MikeBishop MikeBishop deleted the forward-secure branch February 6, 2019 00:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
-transport editorial An issue that does not affect the design of the protocol; does not require consensus.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants