aioquic icon indicating copy to clipboard operation
aioquic copied to clipboard

[Question] Stateless Reset Oracle Attack

Open reteps opened this issue 11 months ago • 4 comments

Hi there, I am performing a research project to follow up some of the analysis done in "A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations"

Image

According to their findings, the Stateless Reset Oracle defenses described in RFC 9000 21.11 has not been implemented in aiohttp.

I was hoping to:

  1. confirm that this isn't something the library handles
  2. check whether you would accept a PR defending against this attack

Thanks!

reteps avatar Jan 31 '25 06:01 reteps

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

github-actions[bot] avatar Jun 01 '25 03:06 github-actions[bot]

@jlaine Can someone reply before this security question will be closed automatically?

reneleonhardt avatar Jun 01 '25 08:06 reneleonhardt

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

github-actions[bot] avatar Oct 01 '25 02:10 github-actions[bot]

I'm not sure I understand how this issue applies to aioquic which:

  • Generates random stateless reset tokens
  • Does not detect or act on stateless resets (this is an issue in itself)

jlaine avatar Oct 07 '25 20:10 jlaine