Update security note to be broader
Focus on what can go wrong, and not on the specific causes. Co-authored-by: teor <teor@riseup.net>
This commit is contained in:
parent
f3419b7baf
commit
966430d400
|
@ -337,9 +337,7 @@ where
|
|||
/// malicious peers keeping all their addresses at the front of the connection
|
||||
/// queue. Honest peers with future clock skew also get adjusted.
|
||||
///
|
||||
/// Rejects all addresses if there are at least two that have reported
|
||||
/// last_seen` times where one is so far in the future and another is so far in
|
||||
/// the past that they cause an overflow when offsetting the times.
|
||||
/// Rejects all addresses if any calculated times overflow or underflow.
|
||||
fn validate_addrs(
|
||||
addrs: impl IntoIterator<Item = MetaAddr>,
|
||||
last_seen_limit: DateTime32,
|
||||
|
|
Loading…
Reference in New Issue