Re: [quicwg/base-drafts] Authenticate Retry (#1710)
Nick Banks <notifications@github.com> Tue, 28 August 2018 13:58 UTC
Return-Path: <noreply@github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01BFB130E61 for <quic-issues@ietfa.amsl.com>; Tue, 28 Aug 2018 06:58:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.009
X-Spam-Level:
X-Spam-Status: No, score=-8.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MAILING_LIST_MULTI=-1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CR3jmY6xsxnD for <quic-issues@ietfa.amsl.com>; Tue, 28 Aug 2018 06:58:10 -0700 (PDT)
Received: from out-4.smtp.github.com (out-4.smtp.github.com [192.30.252.195]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA8AA130F18 for <quic-issues@ietf.org>; Tue, 28 Aug 2018 06:58:09 -0700 (PDT)
Date: Tue, 28 Aug 2018 06:58:08 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1535464688; bh=bTuxWJP/NjSNqN+thXhJr/2tqfuSrIDkXdNXuphhtDo=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=AtnpG4pf/0dtoxEGu1DA/BSpD3ztJEXooktKdQNN4e0f7cSkCoTULydYLFyM35j9B pdZVmTH+pJNsTVgDQNaghhdw3jXsMiT1mLRG0JQ6ikohCUJk8WBE9UJdPsq48+nb82 HMmg6b0crE52kENFSk64JGInR3oNoFPaXRALmjDs=
From: Nick Banks <notifications@github.com>
Reply-To: quicwg/base-drafts <reply+0166e4abb9cad64b782d688c9e20ba6ef8c1598ef8b41fd492cf00000001179d16f092a169ce1522609f@reply.github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/1710/416593915@github.com>
In-Reply-To: <quicwg/base-drafts/issues/1710@github.com>
References: <quicwg/base-drafts/issues/1710@github.com>
Subject: Re: [quicwg/base-drafts] Authenticate Retry (#1710)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5b8554f0ef47a_4ce03f92abed45b81018f0"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: nibanks
X-GitHub-Recipient: quic-issues
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/YM3rbz_K3Y4_4WPhNa7zAwOmToQ>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.27
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Aug 2018 13:58:12 -0000
My primary goal with first suggesting the general design we have today with Retry was to support an **independent** DoS mitigation device to be put in path in front of the server. This is a requirement we get from Azure. If any changes to the Retry design require some state to be shared between the mitigation device (we own) and the backend QUIC server (we don't own), that will severely hamper the Azure efforts. It would require some deployment story and would make things a lot more complex for users and would likely go unused then. You state above that unauthenticated Retry packets are a source of some concern, show that the initial CID can be modified and then go on to say it isn't a big deal (which I agree with). I'm still not really sure what folks are worried about this this supposed attack vector. Initial CID and Initial packet encryption are essentially just used for version ossification prevention. If the attacker understands the version, it's essentially cleartext. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/quicwg/base-drafts/issues/1710#issuecomment-416593915
- [quicwg/base-drafts] Authenticate Retry (#1710) Martin Thomson
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Nick Banks
- Re: [quicwg/base-drafts] Authenticate Retry (#171… MikkelFJ
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Marten Seemann
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Mike Bishop
- Re: [quicwg/base-drafts] Authenticate Retry (#171… hardie
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Martin Thomson
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Juha-Matti Tilli
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Lars Eggert
- Re: [quicwg/base-drafts] Authenticate Retry (#171… mirjak
- Re: [quicwg/base-drafts] Authenticate Retry (#171… MikkelFJ
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Juha-Matti Tilli
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Lars Eggert
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Kazuho Oku
- Re: [quicwg/base-drafts] Authenticate Retry (#171… MikkelFJ
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Juha-Matti Tilli
- Re: [quicwg/base-drafts] Authenticate Retry (#171… Martin Thomson