Re: [Ufmrg] Follow-up: HTTP/2 Rapid Reset & Formal Analysis

"Salz, Rich" <rsalz@akamai.com> Wed, 08 November 2023 14:40 UTC

Return-Path: <rsalz@akamai.com>
X-Original-To: ufmrg@ietfa.amsl.com
Delivered-To: ufmrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6EBFC15C2BE for <ufmrg@ietfa.amsl.com>; Wed, 8 Nov 2023 06:40:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.805
X-Spam-Level:
X-Spam-Status: No, score=-2.805 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kLb7o1f8A7Sw for <ufmrg@ietfa.amsl.com>; Wed, 8 Nov 2023 06:40:45 -0800 (PST)
Received: from mx0b-00190b01.pphosted.com (mx0b-00190b01.pphosted.com [IPv6:2620:100:9005:57f::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F986C151520 for <ufmrg@irtf.org>; Wed, 8 Nov 2023 06:40:43 -0800 (PST)
Received: from pps.filterd (m0122330.ppops.net [127.0.0.1]) by mx0b-00190b01.pphosted.com (8.17.1.22/8.17.1.22) with ESMTP id 3A8Dfk9w021001; Wed, 8 Nov 2023 14:40:40 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h= from:to:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=jan2016.eng; bh=FK/6YuDqYSxkfHPCj6 dhGtArWhD/rlQJ8MZgAua4+nA=; b=NCu8+Gb4J03hZ4FBI70dG+dzlYZV1bzV26 zbYcqYpSqi/tXct2yhKBfWieH5/EJy4Kjjn1H+0kdZwkvy4Dp15t+G+F3yb/PFdn cwItTphdknu+VwXG6rFYLPbzzwDTtrW5M3HNaG/TB/xvU4yZY3664yFoCGznT93/ 0fpM4hE8yUqoFt3zh8X45A7ELKHqodyUmzgb9n5ZfZKVYMnKqNAnvFgGaZXH+6YR OM5XuYygy3xpj/7rELnkeFIEkCUSTcE1W5ICkejUEz2rbjn/cb1o5SMGJ5VogV+S kIsqDr+9OvPSi3/97jMX8QMn0XVHhr1CTWJEYy+bJy9zv9S7g5Zg==
Received: from prod-mail-ppoint3 (a72-247-45-31.deploy.static.akamaitechnologies.com [72.247.45.31] (may be forged)) by mx0b-00190b01.pphosted.com (PPS) with ESMTPS id 3u7w4dqayh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 Nov 2023 14:40:40 +0000 (GMT)
Received: from pps.filterd (prod-mail-ppoint3.akamai.com [127.0.0.1]) by prod-mail-ppoint3.akamai.com (8.17.1.19/8.17.1.19) with ESMTP id 3A8DsSP8022665; Wed, 8 Nov 2023 09:40:39 -0500
Received: from email.msg.corp.akamai.com ([172.27.50.200]) by prod-mail-ppoint3.akamai.com (PPS) with ESMTPS id 3u84cyanxx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 Nov 2023 09:40:39 -0500
Received: from ustx2ex-dag4mb4.msg.corp.akamai.com (172.27.50.203) by ustx2ex-dag4mb1.msg.corp.akamai.com (172.27.50.200) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.25; Wed, 8 Nov 2023 08:40:39 -0600
Received: from ustx2ex-dag4mb4.msg.corp.akamai.com ([172.27.50.203]) by ustx2ex-dag4mb4.msg.corp.akamai.com ([172.27.50.203]) with mapi id 15.02.1258.025; Wed, 8 Nov 2023 06:40:39 -0800
From: "Salz, Rich" <rsalz@akamai.com>
To: Liu Si <si.liu@inf.ethz.ch>, UFMRG IRTF <ufmrg@irtf.org>
Thread-Topic: [Ufmrg] Follow-up: HTTP/2 Rapid Reset & Formal Analysis
Thread-Index: AQHaEkmSjRUYMVjkGUqngHVc7l3P27Bwa5IAgABFOQA=
Date: Wed, 08 Nov 2023 14:40:38 +0000
Message-ID: <719D3A46-A2C6-460E-8E22-7B4A094F6036@akamai.com>
References: <AM9PR02MB70277E088A746E8424A0BC74ABA8A@AM9PR02MB7027.eurprd02.prod.outlook.com> <AD373208-B507-4E18-A7BA-E9A0A3AC1A1E@inf.ethz.ch>
In-Reply-To: <AD373208-B507-4E18-A7BA-E9A0A3AC1A1E@inf.ethz.ch>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.78.23102801
x-originating-ip: [172.27.164.43]
Content-Type: multipart/alternative; boundary="_000_719D3A46A2C6460E8E227B4A094F6036akamaicom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-08_03,2023-11-08_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=675 spamscore=0 malwarescore=0 mlxscore=0 suspectscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311060000 definitions=main-2311080120
X-Proofpoint-GUID: xpJ1VhtoY0GnLMFCGqCr8G50UMzsx-Jo
X-Proofpoint-ORIG-GUID: xpJ1VhtoY0GnLMFCGqCr8G50UMzsx-Jo
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-08_03,2023-11-08_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 phishscore=0 clxscore=1011 priorityscore=1501 suspectscore=0 mlxlogscore=691 malwarescore=0 bulkscore=0 adultscore=0 lowpriorityscore=0 spamscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2311060001 definitions=main-2311080121
Archived-At: <https://mailarchive.ietf.org/arch/msg/ufmrg/DclDgY9MGJbO3SQevzA0uwK98w4>
Subject: Re: [Ufmrg] Follow-up: HTTP/2 Rapid Reset & Formal Analysis
X-BeenThere: ufmrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Usable Formal Methods Research Group <ufmrg.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/ufmrg>, <mailto:ufmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ufmrg/>
List-Post: <mailto:ufmrg@irtf.org>
List-Help: <mailto:ufmrg-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/ufmrg>, <mailto:ufmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Nov 2023 14:40:49 -0000

1. Formalizing the semantics of DNS resolution. Along the way, we’ve identified ambiguities and underspecificaiton in the RFCs.
2. Discovering new DoS vulnerabilities in DNS including multiple attacks that can achieve large amplification effects.

I would be happy to share more if someone finds it interesting. I hope this helps anyway.

Yes, please!