Fixed potential DoS issue
This commit is contained in:
parent
1dd590b91b
commit
068d932f2c
@ -312,7 +312,7 @@ func (device *Device) RoutineHandshake() {
|
||||
|
||||
entry := device.indices.Lookup(reply.Receiver)
|
||||
if entry.peer == nil {
|
||||
return
|
||||
continue
|
||||
}
|
||||
entry.peer.mac.ConsumeReply(&reply)
|
||||
continue
|
||||
@ -323,7 +323,7 @@ func (device *Device) RoutineHandshake() {
|
||||
|
||||
if !device.mac.CheckMAC1(elem.packet) {
|
||||
logDebug.Println("Received packet with invalid mac1")
|
||||
return
|
||||
continue
|
||||
}
|
||||
|
||||
// endpoints destination address is the source of the datagram
|
||||
@ -347,7 +347,7 @@ func (device *Device) RoutineHandshake() {
|
||||
reply, err := device.mac.CreateReply(elem.packet, sender, srcBytes)
|
||||
if err != nil {
|
||||
logError.Println("Failed to create cookie reply:", err)
|
||||
return
|
||||
continue
|
||||
}
|
||||
|
||||
// marshal and send reply
|
||||
|
Loading…
Reference in New Issue
Block a user