diff --git a/README.md b/README.md index 93fe544f..dc0b459e 100644 --- a/README.md +++ b/README.md @@ -22,7 +22,7 @@ Done: Major TODOs: -- Security, especially DOS protections +- Security, especially DoS protections - Performance - Better packet loss detection - Connection migration diff --git a/ackhandler/received_packet_handler_test.go b/ackhandler/received_packet_handler_test.go index 16f865b4..5a4bb54f 100644 --- a/ackhandler/received_packet_handler_test.go +++ b/ackhandler/received_packet_handler_test.go @@ -325,7 +325,7 @@ var _ = Describe("receivedPacketHandler", func() { Expect(handler.lowestInReceivedTimes).To(Equal(protocol.PacketNumber(4))) }) - // this prevents a DOS where a client sends us an unreasonably high LeastUnacked value + // this prevents a DoS where a client sends us an unreasonably high LeastUnacked value It("does not garbage collect packets higher than the LargestObserved packet number", func() { err := handler.ReceivedPacket(10) Expect(err).ToNot(HaveOccurred()) diff --git a/ackhandler/sent_packet_handler_test.go b/ackhandler/sent_packet_handler_test.go index 8eb81975..59cc5514 100644 --- a/ackhandler/sent_packet_handler_test.go +++ b/ackhandler/sent_packet_handler_test.go @@ -211,7 +211,7 @@ var _ = Describe("SentPacketHandler", func() { }) }) - Context("DOS mitigation", func() { + Context("DoS mitigation", func() { It("checks the size of the packet history, for unacked packets", func() { for i := protocol.PacketNumber(1); i < protocol.MaxTrackedSentPackets+10; i++ { packet := Packet{PacketNumber: protocol.PacketNumber(i), Frames: []frames.Frame{&streamFrame}, Length: 1} diff --git a/protocol/server_parameters.go b/protocol/server_parameters.go index c2ab1ad8..511bb469 100644 --- a/protocol/server_parameters.go +++ b/protocol/server_parameters.go @@ -64,7 +64,7 @@ const MaxTrackedReceivedPackets = 2 * DefaultMaxCongestionWindow const MaxTrackedReceivedAckRanges = DefaultMaxCongestionWindow // MaxStreamFrameSorterGaps is the maximum number of gaps between received StreamFrames -// prevents DOS attacks against the streamFrameSorter +// prevents DoS attacks against the streamFrameSorter const MaxStreamFrameSorterGaps = 1000 // CryptoMaxParams is the upper limit for the number of parameters in a crypto message. diff --git a/stream_frame_sorter_test.go b/stream_frame_sorter_test.go index ebdbdf95..f8b70c2c 100644 --- a/stream_frame_sorter_test.go +++ b/stream_frame_sorter_test.go @@ -395,7 +395,7 @@ var _ = Describe("StreamFrame sorter", func() { }) }) - Context("DOS protection", func() { + Context("DoS protection", func() { It("errors when too many gaps are created", func() { for i := 0; i < protocol.MaxStreamFrameSorterGaps; i++ { f := &frames.StreamFrame{