Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Effect on stateless resets #9

Closed
martinthomson opened this issue Mar 1, 2020 · 4 comments · Fixed by #29
Closed

Effect on stateless resets #9

martinthomson opened this issue Mar 1, 2020 · 4 comments · Fixed by #29

Comments

@martinthomson
Copy link
Member

The draft doesn't address the impact of each method of connection ID generation on how servers can use stateless resets.

Most of this is likely bound up in decisions stemming from #8. If you can guess a valid but unused connection ID, then you might be able to induce a stateless reset that could be used to kill an open connection.

As the draft only includes methods that include an explicit server identifier, it is possible that as long as valid values cannot be guessed, the effect is minimal and each server instance can have its own configured stateless reset key (or a shared key from which a per-server key is derived using a KDF).

@martinduke
Copy link
Contributor

martinduke commented Mar 6, 2020

I don't understand the attack here. A given CID will deterministically map to a specific server instance. So there is no way for another server to receive a packet with that CID and generate a stateless reset. What am I missing?

There might be something here with the differing treatment of long-header vs. short-header packets, (and the option for servers to send resets on long headers), but I'll have to think about it more.

@martinduke
Copy link
Contributor

As to the last point, nope: even a long header with a DCID that conforms to the server's expectations (i.e. maps to a real server) will get delivered to that server, so I don't think that's an attack.

@martinduke
Copy link
Contributor

@martinthomson Should we talk about this issue more, or are you satisfied enough that I can close it?

@martinthomson
Copy link
Member Author

I don't see any mention of stateless reset in the draft at all. That's probably something worth addressing, even if it is to say what you have already.

martinduke added a commit that referenced this issue Jun 16, 2020
Added two sections to Security Considerations (Stateless Reset Oracle and Local Configurations Only). Fixes #9 and #27.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants