Update security note to be broader
Focus on what can go wrong, and not on the specific causes. Co-authored-by: teor <teor@riseup.net>
This commit is contained in:
parent
f3419b7baf
commit
966430d400
|
@ -337,9 +337,7 @@ where
|
||||||
/// malicious peers keeping all their addresses at the front of the connection
|
/// malicious peers keeping all their addresses at the front of the connection
|
||||||
/// queue. Honest peers with future clock skew also get adjusted.
|
/// queue. Honest peers with future clock skew also get adjusted.
|
||||||
///
|
///
|
||||||
/// Rejects all addresses if there are at least two that have reported
|
/// Rejects all addresses if any calculated times overflow or underflow.
|
||||||
/// last_seen` times where one is so far in the future and another is so far in
|
|
||||||
/// the past that they cause an overflow when offsetting the times.
|
|
||||||
fn validate_addrs(
|
fn validate_addrs(
|
||||||
addrs: impl IntoIterator<Item = MetaAddr>,
|
addrs: impl IntoIterator<Item = MetaAddr>,
|
||||||
last_seen_limit: DateTime32,
|
last_seen_limit: DateTime32,
|
||||||
|
|
Loading…
Reference in New Issue