Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How do we ensure plaintext never leaks? #68

Open
mtfriesen opened this issue May 25, 2023 · 0 comments
Open

How do we ensure plaintext never leaks? #68

mtfriesen opened this issue May 25, 2023 · 0 comments
Labels
QEO Related to QUIC encryption/decryption offload

Comments

@mtfriesen
Copy link
Contributor

  1. How do we ensure a QEO packet decrypted by the NIC never gets misdelivered to the wrong socket? Windows allows packets to be pended all over the place, so what happens if a local UDP port or QEO offload ID gets reused while a decrypted packet is sitting in a queue?
  2. How do we ensure a QEO packet never gets transmitted onto the wire in plaintext? Is this 100% the responsibility of the NIC? What if an intermediate component calls NDIS APIs to clone a packet and fails to copy the QEO OOB?
@mtfriesen mtfriesen added the QEO Related to QUIC encryption/decryption offload label May 25, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
QEO Related to QUIC encryption/decryption offload
Projects
None yet
Development

No branches or pull requests

1 participant