summaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2018-01-23 12:23:23 +0000
committerMatt Caswell <matt@openssl.org>2018-01-24 18:02:37 +0000
commit97ea1e7f42eea97b117af08b3c1d29f6443850ab (patch)
treea0100b95025d6da5f9fb4c3b1293ff92322b3780 /doc
parentd0debc0a1cea232d3131b941dba435dc001f3cd3 (diff)
Updates following review of SSL_stateless() code
Reviewed-by: Ben Kaduk <kaduk@mit.edu> (Merged from https://github.com/openssl/openssl/pull/4435)
Diffstat (limited to 'doc')
-rw-r--r--doc/man3/DTLSv1_listen.pod2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man3/DTLSv1_listen.pod b/doc/man3/DTLSv1_listen.pod
index 02c1200268..062215e7ac 100644
--- a/doc/man3/DTLSv1_listen.pod
+++ b/doc/man3/DTLSv1_listen.pod
@@ -39,7 +39,7 @@ If TCP is being used then there is no need to use SSL_stateless(). However some
stream-based transport protocols (e.g. QUIC) may not validate the source
address. In this case a TLSv1.3 application would be susceptible to this attack.
-As a counter measure to this issue TLSv1.3 and DTLS include a stateless cookie
+As a countermeasure to this issue TLSv1.3 and DTLS include a stateless cookie
mechanism. The idea is that when a client attempts to connect to a server it
sends a ClientHello message. The server responds with a HelloRetryRequest (in
TLSv1.3) or a HelloVerifyRequest (in DTLS) which contains a unique cookie. The