-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better Terminology Alignment with QUIC #70
Conversation
ability to cause a routing change or other modification in the path taken by packets that | ||
comprise a connection. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Attackers are not assumed to have control over L3 routing. Instead, they can observe packets on one network segment and make (modified) copies on another segment and win the race to the destination due to, e.g., better SLA.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is what the original L179-182 try to convey.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I copied the text from of Section 21.1 of QUIC.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah ok. Reading that bit from QUIC makes it seem the attacker is more powerful than it needs to be though. In my understanding, it is actually a very specific L4 routing manipulation that is assumed, rather than full-blown control over L3 paths.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Obviously, if the attacker is a router that can inject "better routes" through itself, it can be classified as an off-path attacker in our (i.e., QUIC) terminology. But, it's not necessary to be that powerful.
I have closed this PR since the new text is unlikely to improve readability of the document. |
No description provided.