Closed boaks closed 1 year ago
Please continue discussion at https://github.com/t2trg/t2trg-amplification-attacks/issues/4
(Due to lack of owner rights I could not transfer this repository and instead had to make a new one, I will manually create new issues there for any open issues).
For me this requires to mention, that the server must support that "PUT/POST" and doesn't limit it. It should also be mentioned, that usually the coap payload for one message is limited by 1024 or 1280. So "An attacker may be able to increase ..., if the server doesn't limit that".