quinn-rs / quinn

Async-friendly QUIC implementation in Rust
Apache License 2.0
3.76k stars 380 forks source link

Does Quinn support mitigating rapid reset attacks? #1680

Closed vlovich closed 11 months ago

vlovich commented 11 months ago

With the recent HTTP/2 zero day disclosure, I was wondering if a similar exploit vector might apply to QUIC and specifically if there’s any possible mitigations to apply within the stack, since my understanding is that HTTP/3 basically just moves all the HTTP/2 connection management code within the QUIC network stack.

Ralith commented 11 months ago

Google's opinion is that QUIC is not vulnerable:

We do not believe these attack methods translate directly to HTTP/3 (QUIC) due to protocol differences, and Google does not currently see HTTP/3 used as a DDoS attack vector at scale.

In general, it's the application layer's responsibility to close connections engaging in behavior that abuses application-layer functionality like request handling.

djc commented 11 months ago

See also https://twitter.com/programmingart/status/1712459138947826148.