-
-
Notifications
You must be signed in to change notification settings - Fork 395
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow packets with impossible CIDs to be ignored rather than reset #1796
Conversation
df5e177
to
c66a24a
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice!
I also wonder if the cost of crypto here actually makes it less attractive than the random generator? @lijunwangs do you think this would help your use case (on top of the other options we've merged recently)? |
That's a good question. A more thoughtful choice of hash function, rather than just using whatever ring has lying around, might help. Maybe even just |
For clarity, extra cost is paid here in exactly two places:
|
d103a2b
to
0913219
Compare
Refactored to use a non-cryptographic hash. |
17ea102
to
ee100bf
Compare
Thanks @djc/ @Ralith -- this will be a great add to strengthen the security. Is the change backward compatible? Can it break existing client code? |
It should be backwards-compatible, yeah. |
Reduces the likelihood of Quinn endpoints responding to non-QUIC packets.
I'm not sure whether this is needed, especially after #1794. However, the cost seems low, it's a more direct solution, and defense in depth is nice.