Skip to content

Commit b1d8e51

Browse files
authored
add ref to RFC9000 21.9 in sec considerations
#243
1 parent 34eb1bd commit b1d8e51

File tree

1 file changed

+10
-4
lines changed

1 file changed

+10
-4
lines changed

draft-ietf-quic-ack-frequency.md

+10-4
Original file line numberDiff line numberDiff line change
@@ -572,14 +572,20 @@ connection migration with updated information, e.g. to consider the new RTT esti
572572

573573
# Security Considerations
574574

575-
An improperly configured or malicious data sender could cause a
575+
An improperly configured or malicious data sender could request a
576576
data receiver to acknowledge more frequently than its available resources
577577
permit. However, there are two limits that make such an attack largely
578578
inconsequential. First, the acknowledgment rate is bounded by the rate at which
579579
data is received. Second, ACK_FREQUENCY and IMMEDIATE_ACK frames can only request
580-
an increase in the acknowledgment rate, but cannot force it.
581-
582-
In general, with this extension, a sender cannot force a receiver to acknowledge
580+
an increase in the acknowledgment rate, but cannot enforce it.
581+
582+
{{Section 21.9 of QUIC-TRANSPORT}} provides further guidance on peer denial of service
583+
attacks that could abuse control frames, including ACK frames as well as the newly herein specified
584+
ACK_FREQUENCY and IMMEDIATE_ACK frame, to cause disproportional
585+
processing costs without observable impact on the state of the connection.
586+
Espcially, the IMMEDIATE_ACK frame does not only imply processing cost for receiving
587+
and processing the control frame itself but can also cause additional sending of
588+
packets. However, in general, with this extension, a sender cannot force a receiver to acknowledge
583589
more frequently than the receiver considers safe based on its resource constraints.
584590

585591
# IANA Considerations {#iana}

0 commit comments

Comments
 (0)