From ae09e7fb1483f623a4a2c3e181e7cf98b7439780 Mon Sep 17 00:00:00 2001 From: Luca Deri Date: Thu, 3 Feb 2022 12:19:01 +0100 Subject: Improved risks description --- doc/flow_risks.rst | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'doc/flow_risks.rst') diff --git a/doc/flow_risks.rst b/doc/flow_risks.rst index 7e2ebb528..61ad34d93 100644 --- a/doc/flow_risks.rst +++ b/doc/flow_risks.rst @@ -195,13 +195,13 @@ This risk is set when the `ALPN `_. This risk is triggered for certificates not respecting this directive. .. _Risk 033: NDPI_TLS_SUSPICIOUS_EXTENSION ============================= -This risk is triggered when the domain name (SNI extension) is not printable and thus it is a problem. +This risk is triggered when the domain name (SNI extension) is not printable and thus it is a problem. In TLS extensions can be dynamically specified by the client in the hello packet. .. _Risk 034: @@ -246,7 +246,7 @@ Additionally, some TLS protocol fields are checked for printable characters as w NDPI_POSSIBLE_EXPLOIT ===================== -The risk is set whenever a possible exploit (e.g. `Log4J/Log4Shell `) is detected. +The risk is set whenever a possible exploit (e.g. `Log4J/Log4Shell `_) is detected. .. _Risk 041: @@ -258,4 +258,4 @@ The risk is set whenever a TLS certificate is close to the expiration date. NDPI_PUNYCODE_IDN =================================== -The risk is set whenever a domain name is specified in IDN format as they are sometimes used in `IDN homograph attacks `. +The risk is set whenever a domain name is specified in IDN format as they are sometimes used in `IDN homograph attacks `_. -- cgit v1.2.3