Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

token-based greasing / initial packet protection (downgradable variant) #3178

Closed

Conversation

kazuho
Copy link
Member

@kazuho kazuho commented Oct 31, 2019

There seem to be split views on if the greasing should be downgradable.

This PR is a variant of #3166 that allows downgrade.

The design rationale is that a downgrade attack by a middlebox should be detectable, though it reveals the payload of the Initial packet.

The diff between #3166 and this PR is available at https://github.com/kazuho/base-drafts/compare/kazuho/new-token-with-alias..kazuho/new-token-with-alias-downgradable.

kazuho and others added 26 commits October 29, 2019 12:57
…bet. versions and salts is better than nothing
Co-Authored-By: Mike Bishop <mbishop@evequefou.be>
kazuho and others added 3 commits October 31, 2019 17:27
Co-Authored-By: MikkelFJ <mikkelfj@gmail.com>
Co-Authored-By: MikkelFJ <mikkelfj@gmail.com>
Co-Authored-By: MikkelFJ <mikkelfj@gmail.com>
@martinthomson
Copy link
Member

OBE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants