Age | Commit message (Collapse) | Author |
|
|
|
|
|
This fix prevents a potential attack using intentional packet reordering to
initialize more than one session with using the same handshake keys, leading
to more that one session to be initialized with the same key data altogether,
allowing to decrypt some packets in the worst case.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
state can be used; remove the concept of temporary peers
These changes will fix the possibility of a TCP-SYN-Flood-like DoS attack, at the cost of another
protocol change: as we can't count request IDs when we don't know have temporary peers, request IDs
are removed completely.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
commit.
|
|
don't actually use any of is code
|
|
|
|
|
|
handshakes, but request a re-handshake
|
|
|
|
memory corruption etc. found by Valgrind
|
|
|
|
most of the config file parser
|
|
|
|
crypto implementation
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|