Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apply the 3x amplification-limit to migration too #4264

Merged
merged 21 commits into from
Dec 10, 2020
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 10 additions & 2 deletions draft-ietf-quic-transport.md
Original file line number Diff line number Diff line change
Expand Up @@ -1941,10 +1941,18 @@ confirms that the peer successfully processed an Initial packet. Once an
endpoint has successfully processed a Handshake packet from the peer, it can
consider the peer address to have been validated.

Additionally, a server MAY consider the client address validated if the client
uses a connection ID chosen by the server and the connection ID contains at
Additionally, an endpoint MAY consider the peer address validated if the peer
uses a connection ID chosen by the endpoint and the connection ID contains at
least 64 bits of entropy.

For the client, the value of the Destination Connection ID field in its first
Initial packet allows it to validate the server address as a part of
successfully processing any packet. Initial packets from the server are
protected with keys that are derived from this value (see Section 5.2 of
{{QUIC-TLS}}). Alternatively, the value is echoed by the server in Version
Negotiation packets ({{version-negotiation}}) or included in the Integrity Tag
in Retry packets (Section 5.8 of {{QUIC-TLS}}).

Prior to validating the client address, servers MUST NOT send more than three
times as many bytes as the number of bytes they have received. This limits the
magnitude of any amplification attack that can be mounted using spoofed source
Expand Down
You are viewing a condensed version of this merge commit. You can view the full changes here.