- From: Erik Nygren <notifications@github.com>
- Date: Thu, 15 Jul 2021 16:23:41 -0700
- To: whatwg/fetch <fetch@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Thursday, 15 July 2021 23:23:54 UTC
With the introduction of HTTP/3, Fetch should likely have additions to the bad port list covering common UDP attack vectors. As @davidben mentions in #1189 this should also probably explicitly apply to Alt-Svc and SVCB/HTTPS RR port targets. For example, @mnot raised on the HTTP & QUIC WG this list: * 53 - DNS (already a "bad port") * 123 - NTP (already a "bad port") * 1900 - SSDP * 5353 - mDNS * 11211 - memcached The alternative may be to switch to a "good port" list (#1189) -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/whatwg/fetch/issues/1268
Received on Thursday, 15 July 2021 23:23:54 UTC