QUICforge: Client-side Request Forgery in QUIC

Research output: Contribution to conferencesPaperContributedpeer-review

Contributors

  • Konrad Yuri Gbur - , Technical University of Berlin (Author)
  • Florian Tschorsch - , Technical University of Berlin (Author)

Abstract

The QUIC protocol is gaining more and more traction through its recent standardization and the rising interest by various big tech companies, developing new implementations. QUIC promises to make security and privacy a first-class citizen; yet, challenging these claims is of utmost importance. To this end, this paper provides an initial analysis of client-side request forgery attacks that directly emerge from the QUIC protocol design and not from common vulnerabilities. In particular, we investigate three request forgery attack modalities with respect to their capabilities to be used for protocol impersonation and traffic amplification. We analyze the controllable attack space of the respective protocol messages and demonstrate that one of the attack modalities can indeed be utilized to impersonate other UDP-based protocols, e.g., DNS requests. Furthermore, we identify traffic amplification vectors. Although the QUIC protocol specification states anti-amplification limits, our evaluation of 13 QUIC server implementations shows that in some cases these mitigations are missing or insufficiently implemented. Lastly, we propose mitigation approaches for protocol impersonation and discuss ambiguities in the specification.

Details

Original languageEnglish
Number of pages14
Publication statusPublished - Feb 2023
Peer-reviewedYes
Externally publishedYes

Conference

Title30th Annual Network and Distributed System Security (NDSS) Symposium
Abbreviated titleNDSS 2023
Conference number30
Duration27 February - 3 March 2023
Website
LocationCatamaran Resort Hotel & Spa
CitySan Diego
CountryUnited States of America

External IDs

Scopus 85180621479