You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 20, 2023. It is now read-only.
A time-based rate limiter for PASE negotiation attempts is implemented.
-- The mechanism limits all PASE attempts to 3 failures within a 15 second period.
These parameters are build time defines and can be adjusted for each platform.
-- PASE attempts beyond the limit are rejected immediately with a Common:Busy
status code.
-- For PASE negotiations with key confirmation option enabled: only attempts that
failed with key confirmation error are counted. Successful PASE negotiations
do not reset the rate limiter.
-- For PASE negotiations with key confirmation option disabled: every
PASE negotiation, successful or otherwise, is added to the rate limiter.
This change addresses CVE security vulnerability: CVE-2019-5035
0 commit comments