You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mbedTLS is a stateless TLS library, which requires TLS sessions to be restarted if a client's cookie is invalid (or missing) before Hello Verification can succeed. The default cookie callback functions are not intended to work right out of the box for security reasons.
But I'm lazy and have concluded that since these devices will initially be running on a network with no access to the internet, the risk is low.
Please readmbed's DTLS Tutorial for more information, especially the heading MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED
The text was updated successfully, but these errors were encountered:
NZSmartie
changed the title
DTLS Cookie's are disabled - Vulnerable to amplification attacks
DTLS cookies are disabled - Vulnerable to amplification attacks
Jan 28, 2017
mbedTLS is a stateless TLS library, which requires TLS sessions to be restarted if a client's cookie is invalid (or missing) before Hello Verification can succeed. The default cookie callback functions are not intended to work right out of the box for security reasons.
But I'm lazy and have concluded that since these devices will initially be running on a network with no access to the internet, the risk is low.
Please read mbed's DTLS Tutorial for more information, especially the heading
MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED
The text was updated successfully, but these errors were encountered: