A Study of Deployed Defenses Against Reflected Amplification Attacks in QUIC
Aurélien Buchet and Cristel Pelsser
Abstract
While the QUIC specification now includes mechanisms to prevent DoS attacks, they might not always be enforced by servers. With the increasing deployment of QUIC servers, it is now becoming more important to avoid vulnerabilities that could be exploited on a large scale. This paper presents an extensive study of the current state of QUIC servers and how they implement the mechanisms to prevent DoS attacks. The paper focuses on two different amplification DoS attacks that can be performed using QUIC HTTP/3 servers, enabled by the handshake and the connection migration mechanism. We investigate how QUIC servers respond to these attacks and if they are compliant with the general guidelines regarding the amplification protection. Our results show that while a large proportion of QUIC servers are respectful of the specification, around 20% of the IPv4 servers tested are still breaking the amplification limit for the handshake attack while most of the IPv6 servers are compliant. Most of the servers who support connection migration use the path validation mechanism, preventing the attack on connection migration. Overall, the amplification factor of the attacks remains quite low with a median slightly lower than the limit of 3, set in the standard, for the handshake attack and under 1 for the migration attack.
Publication Details
- Publication Type
- Conference Paper
- Publication Date
- March 2025
- Published In
- Proceedings of the TMA Conference 2025
Suggested citation
Aurélien Buchet and Cristel Pelsser. 2025. A Study of Deployed Defenses Against Reflected Amplification Attacks in QUIC. In Proceedings of the TMA Conference 2025.
BibTeX Citation
@inproceedings{Buchet2025a,
title = {A Study of Deployed Defenses Against Reflected Amplification Attacks in QUIC},
author = {Buchet, Aurélien and Pelsser, Cristel},
year = 2025,
month = mar,
booktitle = {Proceedings of the {TMA} Conference 2025},
abstract = {While the QUIC specification now includes mechanisms to prevent DoS attacks, they might not always be enforced by servers. With the increasing deployment of QUIC servers, it is now becoming more important to avoid vulnerabilities that could be exploited on a large scale. This paper presents an extensive study of the current state of QUIC servers and how they implement the mechanisms to prevent DoS attacks. The paper focuses on two different amplification DoS attacks that can be performed using QUIC HTTP/3 servers, enabled by the handshake and the connection migration mechanism. We investigate how QUIC servers respond to these attacks and if they are compliant with the general guidelines regarding the amplification protection. Our results show that while a large proportion of QUIC servers are respectful of the specification, around 20% of the IPv4 servers tested are still breaking the amplification limit for the handshake attack while most of the IPv6 servers are compliant. Most of the servers who support connection migration use the path validation mechanism, preventing the attack on connection migration. Overall, the amplification factor of the attacks remains quite low with a median slightly lower than the limit of 3, set in the standard, for the handshake attack and under 1 for the migration attack.},
groups = {International Journals and Magazines},
keywords = {QUIC, Amplification DoS, Connection migration, Path validation}
}
Related publications
An Analysis of QUIC Connection Migration in the Wild
Aurélien Buchet and Cristel Pelsser
SIGCOMM Comput. Commun. Rev., 2025
Routing over QUIC: Bringing transport innovations to routing protocols
Thomas Wirtgen, Nicolas Rybowski, and Cristel Pelsser, et al.
Poster session of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23' Poster Session), 2023
An Analysis of QUIC Connection Migration in the Wild
Aurélien Buchet and Cristel Pelsser
arXiv, 2024
Detecting IP-tracking proof interfaces by looking for NATs
Aurélien Buchet, Peter Snyder, and Hamed Haddadi, et al.
2023 7th Network Traffic Measurement and Analysis Conference (TMA), 2023