[Oisf-users] H/2 - perhaps a rhetorical question
Jeff Dyke
jeff.dyke at gmail.com
Tue Mar 27 20:42:40 UTC 2018
With H/2 becoming more and more widely adopted throughout we browsers. Are
they patterns that people are looking into to write signatures against
malicious packets? I understand how difficult this would be being a binary
protocol, but rules can detect TLS known vulnerabilities like heartbleed
and poodle. Is this something that may come in the future for H/2. I'm
sure poodle and heartbleed among others where written after and if you
didn't upgrade shame on you. :)
I'm not a rule writer, nor am i an H/2 wire expert. So mainly this is
simply a curiosity question.
Thanks!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20180327/4639f014/attachment.html>
More information about the Oisf-users
mailing list