[quicwg/base-drafts] Decryption failure == drop packet (#33)

Martin Thomson <notifications@github.com> Mon, 28 November 2016 05:23 UTC

Return-Path: <bounces+848413-a050-quic-issues=ietf.org@sgmail.github.com>
X-Original-To: quic-issues@ietfa.amsl.com
Delivered-To: quic-issues@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6EE141293FC for <quic-issues@ietfa.amsl.com>; Sun, 27 Nov 2016 21:23:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.88
X-Spam-Level:
X-Spam-Status: No, score=-1.88 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RP_MATCHES_RCVD=-1.497, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hr0AO4nfqUod for <quic-issues@ietfa.amsl.com>; Sun, 27 Nov 2016 21:23:09 -0800 (PST)
Received: from o8.sgmail.github.com (o8.sgmail.github.com [167.89.101.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EA1D1293E4 for <quic-issues@ietf.org>; Sun, 27 Nov 2016 21:23:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=github.com; h=from:reply-to:to:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=Xg9VO8ORjjAo1jtVwTvaDdwolwY=; b=oQYE2tQB6am5paEy YTS8bwnKKixdrXqVOhIHHt6T3uwVxE5N33jMul/txir+TW4TlA9e+sdlwepKotGe ziUdeDagwtfOOHDohV2379uQu76HnNQ0tQYFvps3ULgL/6rRSp8tWUikPTFlZWt6 wbt3EPloDHuFwxpd+uv6m4vg/8g=
Received: by filter1078p1mdw1.sendgrid.net with SMTP id filter1078p1mdw1-1238-583BBF3C-F 2016-11-28 05:23:08.183309596 +0000 UTC
Received: from github-smtp2a-ext-cp1-prd.iad.github.net (github-smtp2a-ext-cp1-prd.iad.github.net [192.30.253.16]) by ismtpd0001p1iad1.sendgrid.net (SG) with ESMTP id oPL_Yu2CRMqeAsP92txlgQ for <quic-issues@ietf.org>; Mon, 28 Nov 2016 05:23:08.046 +0000 (UTC)
Date: Sun, 27 Nov 2016 21:23:07 -0800
From: Martin Thomson <notifications@github.com>
To: quicwg/base-drafts <base-drafts@noreply.github.com>
Message-ID: <quicwg/base-drafts/issues/33@github.com>
Subject: [quicwg/base-drafts] Decryption failure == drop packet (#33)
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_583bbf3be7a79_2d863f8ded339130174932"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: martinthomson
X-GitHub-Recipient: quic-issues
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: quic-issues@ietf.org
X-SG-EID: l64QuQ2uJCcEyUykJbxN122A6QRmEpucztpreh3Pak3JUm87hpUGuDIiUghXjJmni5hI+b0kbu/blj gu7vdT4wzq0MasvczfdkFKtVbYjys2pTGsAN/PBj3zie/ig+/lror517W36CoOG11hHXFff+ITn3H9 BcQ7Pq2hG1V0pk94LbmPwAj2qjIQFoODn7JF/Dd1jP2+fTys875STyp9He21hWz1NC6zQdlV+KhOu+ 4=
Archived-At: <https://mailarchive.ietf.org/arch/msg/quic-issues/wxD9n2thjkaoXgV3EJ25MsZk5g0>
X-BeenThere: quic-issues@ietf.org
X-Mailman-Version: 2.1.17
Reply-To: quicwg/base-drafts <reply+0166e4ab5c534701ba85c7424bb566e36438597acfe907f092cf000000011453813b92a169ce0b707efd@reply.github.com>
List-Id: Notification list for GitHub issues related to the QUIC WG <quic-issues.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/quic-issues/>
List-Post: <mailto:quic-issues@ietf.org>
List-Help: <mailto:quic-issues-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/quic-issues>, <mailto:quic-issues-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Nov 2016 05:23:10 -0000

We need to be absolutely explicit here: if unprotecting a packet fails, drop it.  

It's important that we have this rule to prevent trivial DoS attacks on connections.  Also, we need to make it clear that unauthenticated data does not get fed into the system unless we have very careful rules around how we handle that data.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/quicwg/base-drafts/issues/33