Security Considerations Regarding Compression Dictionaries
draft-handte-httpbis-dict-sec-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Felix Handte | ||
Last updated | 2020-05-01 (Latest revision 2019-10-29) | ||
Replaces | draft-kucherawy-httpbis-dict-sec | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources |
GitHub Repository
|
||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Dictionary-based compression enables better performance, but brings state into the process of compression, with all the complexities that follow. This document explores the security implications of this technique in the context of internet protocols and enumerates known risks and mitigations.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)