<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-englishm-moq-relay-dos-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="MoQ Relay DoS">Denial-of-Service Considerations for Media over QUIC Relay Deployments</title>
    <seriesInfo name="Internet-Draft" value="draft-englishm-moq-relay-dos-00"/>
    <author fullname="Mike English">
      <organization>Cloudflare</organization>
      <address>
        <email>ietf@englishm.net</email>
      </address>
    </author>
    <author fullname="Lucas Pardue">
      <organization>Cloudflare</organization>
      <address>
        <email>lucas@lucaspardue.com</email>
      </address>
    </author>
    <author fullname="Aman Sharma">
      <organization>Meta</organization>
      <address>
        <email>amsharma@meta.com</email>
      </address>
    </author>
    <author fullname="Ian Swett">
      <organization>Google</organization>
      <address>
        <email>ianswett@google.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Web and Internet Transport</area>
    <workgroup>Media Over QUIC</workgroup>
    <keyword>moq</keyword>
    <keyword>denial-of-service</keyword>
    <keyword>relay</keyword>
    <keyword>resource exhaustion</keyword>
    <abstract>
      <?line 60?>

<t>The Media over QUIC Transport (MoQT) protocol
presents denial-of-service risks
that differ in character
from those facing typical request-response protocols.
MoQT relays forward, fan out, and optionally cache media content
on behalf of publishers and subscribers.
This document complements the MoQT Security Considerations,
focusing on the unique considerations for relays.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://englishm.github.io/moq-relay-dos/draft-englishm-moq-relay-dos.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-englishm-moq-relay-dos/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Media Over QUIC Working Group mailing list (<eref target="mailto:moq@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/moq/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/moq/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/englishm/moq-relay-dos"/>.</t>
    </note>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Media over QUIC Transport protocol <xref target="MOQT"/>
enables media delivery through intermediary relays
that forward, fan out, and optionally cache content for subscribers.
Unlike request-response protocols
where the server's work is roughly proportional to the client's request,
MoQT has amplification properties,
in the sense that a single SUBSCRIBE can trigger backend lookups,
upstream Transport Session establishment,
and ongoing media delivery
that can significantly exceed the cost of the request itself.
This asymmetry is relevant to the denial-of-service risks
discussed in this document.</t>
      <t><xref target="BCP72"/> requires that protocol specifications
identify potential denial-of-service (DoS) attacks
and describe foreseeable risks with due diligence.
The MoQT transport specification already addresses
resource exhaustion, stream limits, flow control,
and some relay-specific concerns.
This document provides more detailed analysis of the threat landscape —
particularly for relay deployments
where the amplification properties of the protocol are most relevant —
along with operational guidance for implementers and operators.</t>
      <section removeInRFC="true" anchor="motivation">
        <name>Motivation</name>
        <t>This work was motivated by discussion
at the MoQ Working Group interim meeting in February 2026.
The working group decided that detailed DoS analysis
and operational guidance warranted a separate document
rather than additions to the transport specification.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>This document covers denial-of-service
and resource exhaustion threats to MoQT relay deployments.
Authentication, authorization, and billing mechanisms are out of scope,
though they can be critical tools for DoS mitigation in practice
and are referenced where relevant.
Content filtering mechanisms and their resource costs
are also deferred to future work.</t>
        <t>Where this document identifies potential changes
to the transport protocol that could improve DoS resilience,
those are noted
but left to proposals against the transport specification.
While both this document and the transport specification
are under active development,
this document also catalogs mechanisms
that are currently load-bearing for DoS resilience
(<xref target="load-bearing-mitigations"/>)
so that changes elsewhere
do not inadvertently weaken existing protections.</t>
      </section>
      <section anchor="relationship-to-the-transport-specification">
        <name>Relationship to the Transport Specification</name>
        <t>The MoQT transport specification <xref target="MOQT"/> already covers
stream limits, flow control, priority and starvation, timeouts,
and some relay-specific concerns
(state maintenance, SUBSCRIBE_NAMESPACE with short prefixes).
This document does not replace any of that.
It adds threat analysis,
documents which existing mechanisms are load-bearing
for DoS prevention,
and provides operational guidance for relay deployments.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>This document provides operational guidance
for MoQT relay implementations and deployments.
It does not modify or override
protocol requirements specified in <xref target="MOQT"/>.</t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>Relay:</dt>
        <dd>
          <t>A MoQT intermediary that receives content from publishers
and forwards it to subscribers,
potentially caching content
and serving multiple subscribers
from a single upstream subscription.</t>
        </dd>
        <dt>Control Plane:</dt>
        <dd>
          <t>MoQT operations that establish, modify, and tear down state:
SUBSCRIBE, FETCH, PUBLISH_NAMESPACE, SUBSCRIBE_NAMESPACE,
REQUEST_UPDATE, TRACK_STATUS, and related messages.
These often require coordination with backend systems
for routing, authorization, and state management.</t>
        </dd>
        <dt>Data Plane:</dt>
        <dd>
          <t>MoQT operations involved in delivering media objects
to subscribers:
QUIC stream management, object framing, and flow control.</t>
        </dd>
      </dl>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>MoQT relay deployments face resource exhaustion risks
from several categories of actors.
How severe these risks are in practice depends on the deployment model,
authentication requirements,
and trust relationships between participants.</t>
      <section anchor="actors">
        <name>Actors</name>
        <t>This section uses "misbehaving" rather than "malicious"
to describe problematic actors.
A relay's defenses need to handle
both deliberate attacks and innocent misconfiguration
or buggy implementations —
from the relay's perspective,
the distinction often does not matter.</t>
        <t>Note that a relay acting maliciously
with respect to content integrity or confidentiality
(interception, manipulation, selective suppression)
is a media security concern rather than a DoS concern
and is out of scope for this document.</t>
        <section anchor="misbehaving-subscriber">
          <name>Misbehaving Subscriber</name>
          <t>Subscribers tend to face fewer authentication constraints,
which can create a broader attack surface.
In broadcast scenarios —
which are a significant near-term deployment model for MoQT —
subscribers may be minimally authenticated
or entirely unauthenticated.
A malicious subscriber can issue requests
that force relays or publishers to commit resources
(subscriptions, buffer allocations, backend lookups),
manipulate flow control to cause excessive buffering,
rapidly create and cancel subscriptions
to generate processing overhead,
or subscribe to content with no intent to actually consume it.</t>
          <t>The impact a misbehaving subscriber can have
depends on where they sit in the topology.
If subscribers connect through a relay
operated by the content provider (or its CDN),
the operator can impose limits and terminate abusive sessions
with full context about what legitimate behavior looks like.
If subscribers connect to third-party relays,
the relay may have less information
to distinguish attacks from unusual but legitimate usage.</t>
        </section>
        <section anchor="misbehaving-publisher">
          <name>Misbehaving Publisher</name>
          <t>Publishers are usually more constrained than subscribers.
They tend to have business relationships with the relay operator,
face stronger authentication requirements,
and their traffic patterns are more predictable and visible.
That said, a malicious or compromised publisher can
flood namespace advertisement state
(forcing relays to propagate and store
large numbers of namespace registrations),
publish at rates that overwhelm downstream relays and subscribers,
or exploit protocol features
to force resource commitment without delivering useful content —
for example,
opening many subgroup streams and keeping them active.</t>
        </section>
        <section anchor="misbehaving-relay">
          <name>Misbehaving Relay</name>
          <t>In relay chains or meshes,
a misbehaving relay can cause upstream load
through fan-out amplification,
create namespace advertisement loops,
or fail to enforce resource limits in either direction —
failing to protect downstream clients from a misbehaving publisher,
or failing to protect upstream publishers
from the aggregate load of a large downstream audience.
A compromised relay in a chain effectively acts
as both a misbehaving subscriber (to its upstream peers)
and a misbehaving publisher (to its downstream peers)
at the same time.</t>
        </section>
      </section>
      <section anchor="amplification-properties">
        <name>Amplification Properties</name>
        <t>MoQT has significant amplification properties.
A single SUBSCRIBE message can cause a relay
to perform backend lookups,
establish an upstream subscription to the publisher,
and begin forwarding
a potentially unbounded stream of media objects.
The server-side work can be disproportionately large
relative to the effort required to trigger it —
potentially much larger than in request-response protocols like HTTP,
where the server's cost is roughly proportional to the request.</t>
        <t>This has a direct implication for how limits need to be designed.
Per-session limits are necessary but may not be sufficient:
if an attacker can open many sessions cheaply,
per-session limits just move the problem.
Effective protection requires limits scoped to something
that is expensive for an attacker to obtain in quantity —
an authenticated identity, a billing account, or similar.
The specifics of authentication and billing are out of scope here,
but session-level controls alone may not be sufficient —
they could be one layer of a defense-in-depth strategy.</t>
      </section>
    </section>
    <section anchor="control-plane-considerations">
      <name>Control Plane Considerations</name>
      <t>MoQT relay deployments require authoritative answers
to routing questions:
which namespaces have been registered via PUBLISH_NAMESPACE,
where a subscription should be forwarded,
and whether an incoming request is permitted.
Every relay — regardless of deployment size —
maintains state to answer these questions.
The cost of maintaining that state
and the consequences of getting it wrong
both grow with the scale of the deployment.</t>
      <t>On a single relay node, authoritative state is local:
lookups and updates are bounded by CPU and memory.
As deployments grow to multiple nodes,
that state must be shared —
through replication, coordination,
or some partitioning scheme —
and the per-operation cost tends to increase accordingly.
MoQT is designed to support distribution at scale
through third-party relay networks
(see <xref target="MOQT"/>, Section 1.1.4),
so this document focuses on the cost profile
where these pressures are most acute.</t>
      <t>In general,
operations that read authoritative state
tend to be cheaper than operations that write or update it,
and this asymmetry tends to widen
as the number of nodes sharing that state grows —
particularly when those nodes are geographically distributed.
Understanding the cost profile of different operations
is important for setting appropriate limits.
Examining costs through the lens of each control message type
is a practical way to do this,
particularly for write-heavy operations.</t>
      <section anchor="authoritative-state-and-coordination-costs">
        <name>Authoritative State and Coordination Costs</name>
        <t>Several MoQT control messages create or modify authoritative state
that the relay uses for routing and resource management:</t>
        <dl>
          <dt>PUBLISH_NAMESPACE:</dt>
          <dd>
            <t>Registers a namespace as actively published.
The relay must record this
so that incoming subscriptions can be matched
to the correct publisher.
In a multi-node deployment,
this registration must be visible to other nodes
that may receive subscriptions for the same namespace.</t>
          </dd>
          <dt>SUBSCRIBE:</dt>
          <dd>
            <t>Requests content for a Full Track Name
(Track Namespace + Track Name).
The relay must look up the registered namespace,
determine where the content can be sourced,
and may need to establish an upstream forwarding path.
Each subscription creates ongoing state
that must be maintained for the lifetime of the subscription.</t>
          </dd>
          <dt>SUBSCRIBE_NAMESPACE:</dt>
          <dd>
            <t>Registers interest in content matching a namespace prefix.
This inverts the namespace-advertisement flow:
instead of matching a subscription against registered namespaces,
the relay must match incoming PUBLISH_NAMESPACE messages
against registered namespace subscriptions.
The state cost can be similar to PUBLISH_NAMESPACE
but evaluated in the reverse direction.</t>
          </dd>
        </dl>
        <t>At the smallest scale,
these operations are local lookups and writes.
At larger scales,
they may require coordination across nodes —
whether through consensus protocols,
centralized registries, or other mechanisms.
The specific costs depend on the deployment architecture,
but the relative ordering is consistent:
control plane operations that touch authoritative state
can be significantly more expensive per message
than data plane forwarding.
This cost differential means the control plane
may warrant particular attention
when designing resource exhaustion defenses.</t>
      </section>
      <section anchor="rapid-request-cycles">
        <name>Rapid Request Cycles</name>
        <t>Rapidly creating and canceling subscriptions
forces repeated setup and teardown work at the relay —
and potentially at upstream publishers —
while the attacker pays only the cost
of sending small control messages.
This is directly analogous
to the HTTP/2 "Rapid Reset" attack <xref target="HTTP2-RAPID-RESET"/>,
where attackers exploited the asymmetry
between the cost of sending RST_STREAM
and the server-side cost of stream setup.</t>
        <t>The risk is not limited to subscription churn.
Any control message that triggers work at the relay
can be abused through rapid repetition,
including priority updates
that may force reordering of internal scheduling structures.</t>
        <t>Implementations that track request rates per session
can detect and terminate sessions
exhibiting excessive churn
without making progress on useful data transfer.</t>
      </section>
      <section anchor="namespace-advertisement-flooding">
        <name>Namespace Advertisement Flooding</name>
        <t>Because namespace advertisement state
may need to be globally registered,
an attacker who can publish (or a compromised publisher)
can flood the namespace store with PUBLISH_NAMESPACE messages.
These are write-heavy operations
against authoritative state
(see the read/write cost asymmetry
discussed in <xref target="control-plane-considerations"/>),
and in systems using consensus protocols
with per-transaction overhead,
a flood of PUBLISH_NAMESPACE messages
can quickly exhaust capacity.
SUBSCRIBE_NAMESPACE can have a similar cost profile:
each namespace subscription registers matching state
that must be evaluated against every incoming PUBLISH_NAMESPACE.</t>
        <t>Imposing limits on active namespace advertisements
and namespace subscriptions —
both per session and per authenticated identity —
limits the impact a single actor can have on the namespace store.</t>
      </section>
      <section anchor="update-coalescing">
        <name>Update Coalescing</name>
        <t>REQUEST_UPDATE messages have a useful property:
unlike HTTP/2 priority tree updates
(where each update forces a tree restructure),
multiple pending REQUEST_UPDATE messages for the same request
can be merged into a single state change before being applied.
Rapid REQUEST_UPDATE messages
still consume network and parsing resources,
but they need not cause proportional backend work.</t>
        <t>Coalescing pending updates where semantically equivalent
significantly reduces the effectiveness
of update-flood attacks.</t>
      </section>
    </section>
    <section anchor="data-plane-considerations">
      <name>Data Plane Considerations</name>
      <t>Data plane resource exhaustion targets the media forwarding path:
memory consumed by buffered objects,
bandwidth spent on delivery,
and processing capacity for framing and scheduling.</t>
      <section anchor="slow-subscribers">
        <name>Slow Subscribers</name>
        <t>A subscriber that consumes data slower than it is produced
causes data to accumulate at the relay.
The relay must buffer objects waiting to be read,
and that memory pressure could affect other subscribers
on the same relay.
This can happen because the subscriber's network is slow,
because the subscriber's application can't keep up,
or because the subscriber is deliberately
not consuming data at all.</t>
        <t>Relays that detect and handle slow subscribers
can limit this accumulation.
Options include dropping lower-priority data,
canceling subscriptions that fall too far behind the live edge,
and imposing per-subscriber buffer limits.</t>
      </section>
      <section anchor="join-time-buffering">
        <name>Join-Time Buffering</name>
        <t>When a subscriber joins a live stream
and requests historical data —
to build a decode buffer
or start from a valid random access point —
the relay must deliver that historical data
while live data continues to arrive.
If the subscriber's bandwidth is limited,
the historical delivery takes time
during which live objects queue at the relay.
For high-bitrate streams,
this transient buffering spike can be significant.</t>
        <t>This is not inherently an attack —
it happens in normal operation.
But it creates a window that an attacker could exploit
by joining many streams simultaneously
with constrained receive windows.
Limiting the amount of data buffered per subscriber
during join operations contains this risk.
When limits are exceeded,
a relay can cancel the subscription,
skip ahead to the live edge,
or reduce delivery quality.</t>
      </section>
      <section anchor="flow-control-limitations">
        <name>Flow Control Limitations</name>
        <t>QUIC flow control (<xref section="4" sectionFormat="of" target="RFC9000"/>) protects receivers
from memory exhaustion,
but its protections have limits that are worth understanding:</t>
        <dl>
          <dt>Within a single MoQT session:</dt>
          <dd>
            <t>QUIC flow control operates at the connection and stream level.
MoQT's prioritization mechanism intentionally allows
higher-priority subscriptions to consume resources
at the expense of lower-priority ones —
that is by design for media delivery.
But it means a single high-priority subscription
can starve other subscriptions within the same session,
and QUIC flow control will not prevent it.</t>
          </dd>
          <dt>Across multiple MoQT sessions:</dt>
          <dd>
            <t>Flow control on one session does not prevent
a slow subscriber on that session
from causing resource accumulation
that affects other sessions at the same relay.
A relay must manage cross-session resource allocation
independently.</t>
          </dd>
        </dl>
        <t>MoQT does not currently provide
per-subscription resource isolation.
Within a session,
a single subscription can consume
an unbounded share of buffer memory,
outbound bandwidth, and scheduling priority.
Across sessions,
a single session can similarly dominate
relay-wide memory and bandwidth
unless the relay imposes application-layer limits.
Relays that implement fairness policies across sessions —
such as per-session buffer caps
or weighted bandwidth allocation —
can prevent one subscriber's behavior
from degrading service for others.</t>
      </section>
    </section>
    <section anchor="relay-dual-role-considerations">
      <name>Relay Dual-Role Considerations</name>
      <t>Relays are simultaneously subscribers (to upstream publishers)
and publishers (to downstream subscribers).
This dual role creates DoS considerations
that don't apply to original publishers or end subscribers.</t>
      <section anchor="resource-isolation">
        <name>Resource Isolation</name>
        <t>A relay serving multiple clients
must prevent one client's behavior
from degrading service for the others.
In practice this means
per-client limits on active subscriptions,
namespace advertisements, and concurrent streams;
independent buffer management per downstream subscription
(so a slow subscriber doesn't cause backpressure
on other subscribers' data);
and fairness policies for shared resources
like memory, bandwidth, and backend query capacity.</t>
        <t>These two goals sit in tension:
the more independently a relay handles each downstream subscription,
the less sharing and coalescing it can do upstream,
limiting its ability to scale efficiently.
Operators need to navigate this tradeoff
for their particular deployment.</t>
        <t>That said,
propagating per-subscriber resource pressure upstream
degrades service for every other subscriber on that stream.
If one subscriber is slow,
the relay needs to handle that locally —
dropping data, canceling the subscription,
or adjusting delivery —
rather than reducing the rate
at which it receives data from the publisher.</t>
      </section>
      <section anchor="upstream-load-protection">
        <name>Upstream Load Protection</name>
        <t>Data plane traffic can aggregate efficiently at relays:
multiple downstream subscriptions to the same content
collapse into a single upstream subscription,
and cached objects are served from local state.
Control plane traffic is a different story.
If many downstream subscribers simultaneously
request historical data,
issue REQUEST_UPDATE messages,
or churn through subscriptions,
the relay may need to forward
a high volume of control messages upstream.
This fan-in of control traffic from many downstream sessions
can overwhelm upstream publishers or relays
even when data plane traffic is well-managed.</t>
        <t>Effective defenses include
rate-limiting control messages forwarded upstream,
aggregating or deduplicating upstream requests where possible,
and shedding downstream load
rather than passing it through to upstream peers.</t>
      </section>
      <section anchor="multi-publisher-fan-out">
        <name>Multi-Publisher Fan-Out</name>
        <t>When a relay serves content from multiple publishers,
subscriber operations can fan out upstream
in ways that may not be obvious
from the subscriber's perspective.
Multi-publisher scenarios introduce additional
fan-out and resource isolation considerations
that need further analysis.
This section will be expanded in future revisions.</t>
      </section>
    </section>
    <section anchor="operational-recommendations">
      <name>Operational Recommendations</name>
      <t>Appropriate limits depend on deployment architecture,
hardware capacity, and expected traffic patterns.
The recommendations in this section
are expressed as general principles;
operators will need to determine specific thresholds
for their deployments.</t>
      <section anchor="cost-tracking">
        <name>Cost Tracking</name>
        <t>Tracking resource consumption per transport session —
and, where possible, per authenticated identity —
gives operators the visibility needed to detect abuse.
Useful signals include
the rate of control messages over time,
the number of active subscriptions and namespace advertisements,
buffered data per subscriber,
and the ratio of control plane activity to useful data transfer.</t>
        <t>Sessions or identities
that consume disproportionate resources
relative to the data transfer they facilitate
are candidates for throttling or termination.</t>
      </section>
      <section anchor="rate-limiting">
        <name>Rate Limiting</name>
        <t>Rate limits are the primary defense
against control plane flooding.
A few properties matter
for MoQT relay deployments specifically:</t>
        <t>Rate limits are most effective
when scoped per-client or per-authenticated-identity,
not just globally.
A purely global rate limit
can be consumed by a single attacker,
denying service to everyone else.
Scoping limits per deployment unit —
per customer account or per content namespace —
further isolates abuse
so that problems in one context do not affect another.</t>
        <t>Per-client limits and systemic circuit breakers
serve different purposes and both contribute to a complete defense.
Per-client limits prevent individual abuse.
Circuit breakers protect the backend
when many clients simultaneously generate
legitimate but excessive load,
as happens during flash crowd events.</t>
        <t>When declining individual requests due to overload,
explicit protocol feedback
(for example, REQUEST_ERROR with <tt>EXCESSIVE_LOAD</tt> in <xref target="MOQT"/>)
is preferable to silent failure.
Clear overload signaling helps legitimate peers back off quickly.</t>
        <t>Traffic characteristics vary across deployments
and evolve over time
as usage patterns and hardware capabilities change.
Limits calibrated relative to observed legitimate traffic patterns
for the deployment tend to be more robust than fixed values.</t>
      </section>
    </section>
    <section anchor="load-bearing-mitigations" removeInRFC="true">
      <name>Tracking Protocol Load-Bearing Mitigations</name>
      <t>Several MoQT protocol mechanisms serve as mitigations
against resource exhaustion,
even if some of them were not originally designed
with that as their primary purpose.
It is worth documenting these explicitly
so that proposed changes to the protocol
can be evaluated for their security impact,
since removing or weakening a mechanism
that happens to be load-bearing for DoS prevention
could reintroduce risks that were previously mitigated.
When evaluating protocol changes,
it is worth considering
whether existing mitigations are being preserved,
replaced with equivalent mechanisms,
or inadvertently weakened.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Mechanism</th>
            <th align="left">Threat Mitigated</th>
            <th align="left">Notes</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">MAX_REQUEST_ID</td>
            <td align="left">Rapid request flooding; unbounded state commitment</td>
            <td align="left">Limits outstanding requests a peer can issue. Any proposal to remove or change this needs to provide equivalent protection.</td>
          </tr>
          <tr>
            <td align="left">QUIC Stream Limits</td>
            <td align="left">Stream exhaustion</td>
            <td align="left">Baseline protection. When used as the primary request-limiting mechanism, configuration needs to account for security implications.</td>
          </tr>
          <tr>
            <td align="left">QUIC Flow Control</td>
            <td align="left">Receiver memory exhaustion</td>
            <td align="left">Protects individual receivers but does not provide cross-session fairness or state exhaustion protection.</td>
          </tr>
          <tr>
            <td align="left">Subscription Timeouts</td>
            <td align="left">Idle resource consumption</td>
            <td align="left">Lets relays reclaim resources from inactive subscriptions.</td>
          </tr>
          <tr>
            <td align="left">MAX_AUTH_TOKEN_CACHE_SIZE</td>
            <td align="left">Memory consumption</td>
            <td align="left">Bounds total per-session bytes of registered authorization token aliases/values</td>
          </tr>
          <tr>
            <td align="left">Control message length limit (2^16-1)</td>
            <td align="left">Oversized control-message parsing DoS</td>
            <td align="left">Bounds the size of each control message</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document addresses security considerations
for MoQT relay deployments. It complements the MoQT Security Considerations.
The focus is on denial-of-service threats and resource exhaustion;
authentication, authorization, and billing are out of scope
but can be essential parts of a complete defense.
In particular,
the amplification properties
described in <xref target="amplification-properties"/>
mean that effective DoS protection
may require per-identity or per-account limits
beyond what the transport protocol alone can provide.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RFC9000" to="QUIC"/>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="MOQT">
          <front>
            <title>Media over QUIC Transport</title>
            <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
              <organization>Cisco</organization>
            </author>
            <author fullname="Victor Vasiliev" initials="V." surname="Vasiliev">
              <organization>Google</organization>
            </author>
            <author fullname="Ian Swett" initials="I." surname="Swett">
              <organization>Google</organization>
            </author>
            <author fullname="Alan Frindell" initials="A." surname="Frindell">
              <organization>Meta</organization>
            </author>
            <date day="13" month="January" year="2026"/>
            <abstract>
              <t>   This document defines the core behavior for Media over QUIC Transport
   (MOQT), a media transport protocol designed to operate over QUIC and
   WebTransport, which have similar functionality.  MOQT allows a
   producer of media to publish data and have it consumed via
   subscription by a multiplicity of endpoints.  It supports
   intermediate content distribution networks and is designed for high
   scale and low latency distribution.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-moq-transport-16"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <referencegroup anchor="BCP72" target="https://www.rfc-editor.org/info/bcp72">
          <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552">
            <front>
              <title>Guidelines for Writing RFC Text on Security Considerations</title>
              <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
              <author fullname="B. Korver" initials="B." surname="Korver"/>
              <date month="July" year="2003"/>
              <abstract>
                <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="72"/>
            <seriesInfo name="RFC" value="3552"/>
            <seriesInfo name="DOI" value="10.17487/RFC3552"/>
          </reference>
          <reference anchor="RFC9416" target="https://www.rfc-editor.org/info/rfc9416">
            <front>
              <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
              <author fullname="F. Gont" initials="F." surname="Gont"/>
              <author fullname="I. Arce" initials="I." surname="Arce"/>
              <date month="July" year="2023"/>
              <abstract>
                <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="72"/>
            <seriesInfo name="RFC" value="9416"/>
            <seriesInfo name="DOI" value="10.17487/RFC9416"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC9775">
          <front>
            <title>IRTF Code of Conduct</title>
            <author fullname="C. S. Perkins" initials="C. S." surname="Perkins"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document describes the code of conduct for participants in the
Internet Research Task Force (IRTF).</t>
              <t>The IRTF believes that research is most effective when done in an
open and inclusive forum that encourages diversity of ideas and
participation. Through this code of conduct, the IRTF continues to
strive to create and maintain an environment that encourages broad
participation, and one in which people are treated with dignity,
decency, and respect.</t>
              <t>This document is a product of the Internet Research Steering Group
(IRSG).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9775"/>
          <seriesInfo name="DOI" value="10.17487/RFC9775"/>
        </reference>
        <reference anchor="HTTP2-RAPID-RESET" target="https://www.cve.org/CVERecord?id=CVE-2023-44487">
          <front>
            <title>HTTP/2 Rapid Reset Attack</title>
            <author>
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 710?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <ul spacing="normal">
        <li>
          <t>Ian Swett</t>
        </li>
        <li>
          <t>Aman Sharma</t>
        </li>
        <li>
          <t>Cullen Jennings</t>
        </li>
        <li>
          <t>Will Law</t>
        </li>
        <li>
          <t>Luke Curley</t>
        </li>
        <li>
          <t>Mike Bishop</t>
        </li>
        <li>
          <t>Mo Zanaty</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="use-of-generative-ai">
      <name>Use of Generative AI</name>
      <t>Anthropic's Claude (Sonnet 4.6 and Opus 4.6)
and OpenAI's GPT-5.3 Codex
were used to assist with organizing source materials,
structuring the document, and drafting text.
All AI-generated content was reviewed and approved by the author.
This disclosure follows the guidance in <xref target="RFC9775"/>,
applied voluntarily to this IETF document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
