diff options
author | Matt Caswell <matt@openssl.org> | 2018-01-23 12:23:23 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-01-24 18:02:37 +0000 |
commit | 97ea1e7f42eea97b117af08b3c1d29f6443850ab (patch) | |
tree | a0100b95025d6da5f9fb4c3b1293ff92322b3780 /doc | |
parent | d0debc0a1cea232d3131b941dba435dc001f3cd3 (diff) |
Updates following review of SSL_stateless() code
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/4435)
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man3/DTLSv1_listen.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/man3/DTLSv1_listen.pod b/doc/man3/DTLSv1_listen.pod index 02c1200268..062215e7ac 100644 --- a/doc/man3/DTLSv1_listen.pod +++ b/doc/man3/DTLSv1_listen.pod @@ -39,7 +39,7 @@ If TCP is being used then there is no need to use SSL_stateless(). However some stream-based transport protocols (e.g. QUIC) may not validate the source address. In this case a TLSv1.3 application would be susceptible to this attack. -As a counter measure to this issue TLSv1.3 and DTLS include a stateless cookie +As a countermeasure to this issue TLSv1.3 and DTLS include a stateless cookie mechanism. The idea is that when a client attempts to connect to a server it sends a ClientHello message. The server responds with a HelloRetryRequest (in TLSv1.3) or a HelloVerifyRequest (in DTLS) which contains a unique cookie. The |