node/test/pummel
Ben Noordhuis 3415427dbf tls: mitigate session renegotiation attacks
The TLS protocol allows (and sometimes requires) clients to renegotiate the
session. However, renegotiation requires a disproportional amount of server-side
resources, particularly CPU time, which makes it a potential vector for
denial-of-service attacks.

To mitigate this issue, we keep track of and limit the number of renegotiation
requests over time, emitting an error if the threshold is exceeded.
2012-02-16 18:15:21 +01:00
..
pummel.status
test-child-process-spawn-loop.js
test-debugger-debug-brk.js
test-exec.js
test-fs-watch-file.js
test-http-client-reconnect-bug.js
test-http-upload-timeout.js
test-https-large-response.js
test-keep-alive.js
test-net-many-clients.js
test-net-pause.js
test-net-pingpong-delay.js
test-net-pingpong.js
test-net-throttle.js
test-net-timeout.js
test-net-timeout2.js
test-net-write-callbacks.js
test-next-tick-loops-quick.js
test-process-uptime.js
test-regress-GH-814.js
test-regress-GH-814_2.js
test-regress-GH-892.js
test-timer-wrap.js
test-timer-wrap2.js
test-timers.js
test-tls-ci-reneg-attack.js
test-tls-throttle.js
test-vm-memleak.js
test-watch-file.js
testcfg.py