This commit is contained in:
Marten Seemann
2016-10-28 12:30:52 +07:00
parent 2c11335de4
commit 5fa4ea73e5
5 changed files with 5 additions and 5 deletions

View File

@@ -22,7 +22,7 @@ Done:
Major TODOs:
- Security, especially DOS protections
- Security, especially DoS protections
- Performance
- Better packet loss detection
- Connection migration

View File

@@ -325,7 +325,7 @@ var _ = Describe("receivedPacketHandler", func() {
Expect(handler.lowestInReceivedTimes).To(Equal(protocol.PacketNumber(4)))
})
// this prevents a DOS where a client sends us an unreasonably high LeastUnacked value
// this prevents a DoS where a client sends us an unreasonably high LeastUnacked value
It("does not garbage collect packets higher than the LargestObserved packet number", func() {
err := handler.ReceivedPacket(10)
Expect(err).ToNot(HaveOccurred())

View File

@@ -211,7 +211,7 @@ var _ = Describe("SentPacketHandler", func() {
})
})
Context("DOS mitigation", func() {
Context("DoS mitigation", func() {
It("checks the size of the packet history, for unacked packets", func() {
for i := protocol.PacketNumber(1); i < protocol.MaxTrackedSentPackets+10; i++ {
packet := Packet{PacketNumber: protocol.PacketNumber(i), Frames: []frames.Frame{&streamFrame}, Length: 1}

View File

@@ -64,7 +64,7 @@ const MaxTrackedReceivedPackets = 2 * DefaultMaxCongestionWindow
const MaxTrackedReceivedAckRanges = DefaultMaxCongestionWindow
// MaxStreamFrameSorterGaps is the maximum number of gaps between received StreamFrames
// prevents DOS attacks against the streamFrameSorter
// prevents DoS attacks against the streamFrameSorter
const MaxStreamFrameSorterGaps = 1000
// CryptoMaxParams is the upper limit for the number of parameters in a crypto message.

View File

@@ -395,7 +395,7 @@ var _ = Describe("StreamFrame sorter", func() {
})
})
Context("DOS protection", func() {
Context("DoS protection", func() {
It("errors when too many gaps are created", func() {
for i := 0; i < protocol.MaxStreamFrameSorterGaps; i++ {
f := &frames.StreamFrame{