Re: [quicwg/base-drafts] token-based greasing / initial packet protection (#3166)

MikkelFJ <> Wed, 30 October 2019 07:02 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 2AE8A1200B7 for <>; Wed, 30 Oct 2019 00:02:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.596
X-Spam-Status: No, score=-6.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_28=1.404, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id CEXO1CD4b3cK for <>; Wed, 30 Oct 2019 00:02:50 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 653DD1200B6 for <>; Wed, 30 Oct 2019 00:02:50 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id A8FDF6E0841 for <>; Wed, 30 Oct 2019 00:02:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=pf2014; t=1572418969; bh=5AlB1TqpsT5MuI2Cbt2Q5JU3N1+a5c82g+ZivbEq3u8=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=B09gjj/OpGMYF7cKys2y72kkvBrrtq15aAeLmqhqZ9n0PlYpz90jDysrSY/ZI0w/Z QsxgJcxpHU7FIh/xVJTOWzI5C0X4J0orBPUj6U/sUaNrWIpBeTDqFvzpm2bdoYkWgL CvxWU1CmOM7b2b7IWq6e+OWrL5k18Lyb+cn3rlfo=
Date: Wed, 30 Oct 2019 00:02:49 -0700
From: MikkelFJ <>
Reply-To: quicwg/base-drafts <>
To: quicwg/base-drafts <>
Cc: Subscribed <>
Message-ID: <quicwg/base-drafts/pull/3166/review/>
In-Reply-To: <quicwg/base-drafts/pull/>
References: <quicwg/base-drafts/pull/>
Subject: Re: [quicwg/base-drafts] token-based greasing / initial packet protection (#3166)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5db93599997c1_6e43fbaca2cd96c36145"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: mikkelfj
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
Archived-At: <>
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 30 Oct 2019 07:02:52 -0000

mikkelfj commented on this pull request.

> @@ -3940,6 +4007,19 @@ described in {{QUIC-TLS}}.  This protection does not provide confidentiality or
 integrity against on-path attackers, but provides some level of protection
 against off-path attackers.
+Additionally, the token is accompanied by a checksum.  This is because when a

The checksum is very useful in situations where a bridge forwards a connection over an alternative medium such as USB or Bluetooth. The Retry and VN packets are the only packets that don't have self-integrity checks and such a bridge would be forced to provide additional framing. This framing is tolerable for VN because it is universal, but for Retry it requires version knowledge. It is much simpler if packets can just be forwarded with no knowledge other than length.

You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub: