[Oisf-users] H/2 - perhaps a rhetorical question

Jeff Dyke jeff.dyke at gmail.com
Tue Mar 27 20:42:40 UTC 2018

With H/2 becoming more and more widely adopted throughout we browsers.  Are
they patterns that people are looking into to write signatures against
malicious packets?  I understand how difficult this would be being a binary
protocol, but rules can detect TLS known vulnerabilities like heartbleed
and poodle. Is this something that may come in the future for H/2.  I'm
sure poodle and heartbleed among others where written after and if you
didn't upgrade shame on you. :)

I'm not a rule writer, nor am i an H/2 wire expert.  So mainly this is
simply a curiosity question.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20180327/4639f014/attachment.html>

More information about the Oisf-users mailing list