Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discarding an invalid Initial is allowed #4359

Merged
merged 3 commits into from
Nov 19, 2020
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 8 additions & 8 deletions draft-ietf-quic-transport.md
Original file line number Diff line number Diff line change
Expand Up @@ -3256,6 +3256,14 @@ frame risks a peer missing the first such packet. The only mechanism available
to an endpoint that continues to receive data for a terminated connection is to
use the stateless reset process ({{stateless-reset}}).

As the AEAD on Initial packets does not provide strong authentication, an
endpoint MAY discard an invalid Initial packet. Discarding an Initial packet is
permitted even where this specification otherwise mandates a connection error.
An endpoint can only discard a packet if it does not process the frames in the
packet or reverts the effects of any processing. Discarding invalid Initial
packets might be used to reduce exposure to denial of service; see
{{handshake-dos}}.


## Stream Errors

Expand Down Expand Up @@ -3316,14 +3324,6 @@ contents of the packet and generate Initial packets that will be successfully
authenticated at either endpoint. The AEAD also protects Initial packets
against accidental modification.

As the AEAD on Initial packets does not provide strong authentication, an
endpoint MAY discard an invalid Initial packet. Discarding an Initial packet is
permitted even where this specification otherwise mandates a connection error.
An endpoint can only discard a packet if it does not process the frames in the
packet or reverts the effects of any processing. Discarding invalid Initial
packets might be used to reduce exposure to denial of service; see
{{handshake-dos}}.

All other packets are protected with keys derived from the cryptographic
handshake. The cryptographic handshake ensures that only the communicating
endpoints receive the corresponding keys for Handshake, 0-RTT, and 1-RTT
Expand Down