Skip to content

Commit

Permalink
amplification/0rtt: Point out feature differences with RRC
Browse files Browse the repository at this point in the history
  • Loading branch information
chrysn committed Sep 25, 2024
1 parent 5f38ab3 commit 05d250b
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions draft-bormann-core-corr-clar.md
Original file line number Diff line number Diff line change
Expand Up @@ -517,6 +517,16 @@ It should still include an Echo value, whose presence in the next request serves
This situation can happen at any time in OSCORE,
or in DTLS after a CID based resumption.

Verifying the client's address is not only relevant for amplification attacks
(which addresses attacks described in {{?I-D.irtf-t2trg-amplification-attacks}})
but also for traffic misdirection.
{{Section 7 of ?I-D.ietf-tls-dtls-rrc}} contains a menu of options how to use RRC messages to distinguish different cases.
An 4.01 response with Echo can perform some of the functions equivalently
(with the Echo value taking the place of the RRC cookie),
but does not provide a means to distinguish between non-preferred and preferred paths.
Where that distinction matters,
RRC provides the right tools to make it.

### Replay protection

If it is not certain that the request is not a replay,
Expand Down

0 comments on commit 05d250b

Please sign in to comment.