Re: [quicwg/base-drafts] Clarify the state a client stores with a token (#3150)

Nick Harper <> Fri, 13 December 2019 19:25 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id CB072120826 for <>; Fri, 13 Dec 2019 11:25:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.596
X-Spam-Status: No, score=-6.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_28=1.404, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id nmBMZMAmKMHa for <>; Fri, 13 Dec 2019 11:25:05 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 77887120809 for <>; Fri, 13 Dec 2019 11:25:05 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTP id 060DE121269 for <>; Fri, 13 Dec 2019 11:25:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=pf2014; t=1576265105; bh=IlrFTEHG0idHQUjE1tH3h7De5XBl4+gbpq9Xw0Zl3Qk=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=AXTtDjwwhYLOcD1LCB951hz0RD0Ui5E+u/67SvJIEyNT/MEPFnWO49/tMg9LbC6PF ouCd5g3JRwKkwOBkGZhrOuAN8N1R8UqFLeA7lCDm0FpOU6J0C0v7eJFoi0ryHjiHvN dtyxOFG3XWA9vEEju4aBkqIyYZ7Ru0mXCRnWdFPo=
Date: Fri, 13 Dec 2019 11:25:04 -0800
From: Nick Harper <>
Reply-To: quicwg/base-drafts <>
To: quicwg/base-drafts <>
Cc: Subscribed <>
Message-ID: <quicwg/base-drafts/pull/3150/review/>
In-Reply-To: <quicwg/base-drafts/pull/>
References: <quicwg/base-drafts/pull/>
Subject: Re: [quicwg/base-drafts] Clarify the state a client stores with a token (#3150)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5df3e590b6225_392f3fb86d2cd96c695863"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: nharper
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
Archived-At: <>
X-Mailman-Version: 2.1.29
List-Id: Notification list for GitHub issues related to the QUIC WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 13 Dec 2019 19:25:07 -0000

nharper commented on this pull request.

> @@ -1746,7 +1747,8 @@ validate a client address.  Tokens are not integrated into the cryptographic
 handshake and so they are not authenticated.  For instance, a client might be
 able to reuse a token.  To avoid attacks that exploit this property, a server
 can limit its use of tokens to only the information needed to validate client
+addresses.  A server MUST NOT require the client to correlate any additional
+information with a token (e.g. a NewSessionTicket).

Sorry for the delay. The new paragraph (framed as client considerations) sounds like a better way to describe this point. I've added a version of that paragraph and rebased this PR. (There was a merge conflict for the change above.)

You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub: