Comment

NSA Denies Bloomberg 'Heartbleed' Report Based on Unidentified Sources

107
dog philosopher ஐஒஔ௸4/11/2014 4:09:45 pm PDT

re: #101 kirkspencer

If you’ll forgive clumsy analogy:

In simple it’s to ensure the other computer is ‘healthy’ (the connection is not corrupted by problems either between them or as a result of some sort of system failure). The purpose is so that when sharing large quantities of data - say, while syncing or backing up - that the data is (probably) good.

So it’s send a whole bunch of data, then “say ‘I am still here’”. If I get “I am still here” I continue shoveling. If I get “here” or “I am here” or “still here” then I stop.

That partial quote explains the problem with “ack”. REQ and ACK are tiny and can get through even in partial corruption.

Yes, there is more to it but that’s the layman’s simple.

re: #98 abolitionist

Because UDP is connectionless, the ‘from’ addr field of packets can be spoofed. The heartbeat protocol thing was added to both TSL and DTLS, altho in not quite the same way.

which one of these two explanations?