summaryrefslogtreecommitdiffhomepage
path: root/src
diff options
context:
space:
mode:
authorSergey Kandaurov <pluknet@nginx.com>2020-04-17 12:01:45 +0300
committerSergey Kandaurov <pluknet@nginx.com>2020-04-17 12:01:45 +0300
commitfa264b46b13d4065341cf5cb578a9b0c6ed2b1d3 (patch)
treeaedbde8c4078eba68a934148eb388dafe66c8556 /src
parent7288ac486271ed598a662a4e5ebc9833d4f6b8db (diff)
downloadnginx-fa264b46b13d4065341cf5cb578a9b0c6ed2b1d3.tar.gz
nginx-fa264b46b13d4065341cf5cb578a9b0c6ed2b1d3.tar.bz2
Revert "Rejecting new connections with non-zero Initial packet."
chrome-unstable 83.0.4103.7 starts with Initial packet number 1. I couldn't find a proper explanation besides this text in quic-transport: An endpoint MAY skip packet numbers when sending packets to detect this (Optimistic ACK Attack) behavior.
Diffstat (limited to 'src')
-rw-r--r--src/event/ngx_event_quic.c6
1 files changed, 0 insertions, 6 deletions
diff --git a/src/event/ngx_event_quic.c b/src/event/ngx_event_quic.c
index 34a51f71f..4c9a658a9 100644
--- a/src/event/ngx_event_quic.c
+++ b/src/event/ngx_event_quic.c
@@ -583,12 +583,6 @@ ngx_quic_new_connection(ngx_connection_t *c, ngx_ssl_t *ssl, ngx_quic_tp_t *tp,
return NGX_ERROR;
}
- if (pkt->pn != 0) {
- ngx_log_error(NGX_LOG_INFO, c->log, 0,
- "invalid initial packet number %L", pkt->pn);
- return NGX_ERROR;
- }
-
if (ngx_quic_init_connection(c) != NGX_OK) {
return NGX_ERROR;
}