External DDoS Support for Retry Token Timestamp Disablement #5006
Labels
Area: API
Area: Core
Related to the shared, core protocol logic
Area: Security
Related to security or quality testing
feature request
A request for new functionality
Milestone
Describe the feature you'd like supported
MsQuic Retry Token mechanism uses Timestamp to identify the Key phase. Ask is to make use of Timestamp as an option that can be disabled i.e. if disabled timestamp is not used to get key phase, but rather all active keys (currently 2) are used to decrypt.
Proposed solution
For Ddos and MsQuic shared key Retry Token mechanism to work effectively, it is crucial that the two systems are clock synchronized. This should not be an issue for solutions running within Azure as NTP should take care of that, but can we make this configurable so that it can be disabled when any discrepancies are found with clock synchronization and it starts affecting customers because ddos generated tokens are not correctly verified by msquic server because of drift in timestamps.
Additional context
No response
The text was updated successfully, but these errors were encountered: