@@ -589,14 +589,20 @@ connection migration with updated information, e.g. to consider the new RTT esti
589
589
590
590
# Security Considerations
591
591
592
- An improperly configured or malicious data sender could cause a
592
+ An improperly configured or malicious data sender could request a
593
593
data receiver to acknowledge more frequently than its available resources
594
594
permit. However, there are two limits that make such an attack largely
595
595
inconsequential. First, the acknowledgment rate is bounded by the rate at which
596
596
data is received. Second, ACK_FREQUENCY and IMMEDIATE_ACK frames can only request
597
- an increase in the acknowledgment rate, but cannot force it.
598
-
599
- In general, with this extension, a sender cannot force a receiver to acknowledge
597
+ an increase in the acknowledgment rate, but cannot enforce it.
598
+
599
+ {{Section 21.9 of QUIC-TRANSPORT}} provides further guidance on peer denial of service
600
+ attacks that could abuse control frames, including ACK frames as well as the newly herein specified
601
+ ACK_FREQUENCY and IMMEDIATE_ACK frames, to cause disproportional
602
+ processing costs without observable impact on the state of the connection.
603
+ Especially, the IMMEDIATE_ACK frame does not only imply processing cost for receiving
604
+ and processing the control frame itself but can also cause additional sending of
605
+ packets. However, in general, with this extension, a sender cannot force a receiver to acknowledge
600
606
more frequently than the receiver considers safe based on its resource constraints.
601
607
602
608
# IANA Considerations {#iana}
0 commit comments