Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Recommendation on token ambiguity issue is violating RFC 9000 #303

Open
gloinul opened this issue Mar 16, 2024 · 3 comments
Open

Recommendation on token ambiguity issue is violating RFC 9000 #303

gloinul opened this issue Mar 16, 2024 · 3 comments
Labels
editorial question Further information is requested

Comments

@gloinul
Copy link

gloinul commented Mar 16, 2024

Section 4.1:

"To alleviate such a token ambiguity issue, a server may issue a token that is capable of validating any of the previously validated addresses."

isn't this against this normative rule in Section 8.1.1 of RFC 9000:

"A token sent in a NEW_TOKEN frame or a Retry packet MUST be constructed in a way that allows the server to identify how it was provided to a client. These tokens are carried in the same field but require different handling from servers."?

@mirjak
Copy link
Collaborator

mirjak commented Mar 18, 2024

Yes it updates/changes this rule.

@huitema
Copy link
Contributor

huitema commented Mar 18, 2024

The rule in 8.1.1 is about distinguishing "real time" tokens created when sending a RETRY packet, and "long term" tokens send in NEW_TOKEN frames. The general expectation is that real time tokens are very short lived, but that NEW_TOKEN are valid longer. That's explained in section 8.1.3.

The NEW_TOKEN serve to attest that the client can legitimately send packets from a source IP address, and thus that address validation can be bypassed. This is generally done by linking the token to exactly one address, but there is no hard rule against linking to several IP addresses, as long as the server is convinced that the client can legitimately send packets from these IP addresses.

@mirjak
Copy link
Collaborator

mirjak commented May 14, 2024

Okay, I guess the statement above is vague enough that there is actually no conflict with RFC9000 as it only says "identify how it was provided to a client". We now add to this requirement and say all IP addresses used by the client need to be validated. Or I guess if you can't validate all IP addresses that have been used before, resumption might simply fails from some addresses, which I guess is okay as well.

Two quick questions:

  1. Not sure anymore if we need to say more. Do we? What?
  2. Should the sentence also use normative language?

@mirjak mirjak added question Further information is requested editorial labels May 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
editorial question Further information is requested
Projects
None yet
Development

No branches or pull requests

3 participants