<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>重放攻击 on Answer</title>
    <link>https://answer.freetools.me/tags/%E9%87%8D%E6%94%BE%E6%94%BB%E5%87%BB/</link>
    <description>Recent content in 重放攻击 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Fri, 06 Mar 2026 13:59:57 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/%E9%87%8D%E6%94%BE%E6%94%BB%E5%87%BB/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>零往返的代价：HTTP/3 0-RTT 为何成为开发者必须正视的安全陷阱</title>
      <link>https://answer.freetools.me/%E9%9B%B6%E5%BE%80%E8%BF%94%E7%9A%84%E4%BB%A3%E4%BB%B7http/3-0-rtt-%E4%B8%BA%E4%BD%95%E6%88%90%E4%B8%BA%E5%BC%80%E5%8F%91%E8%80%85%E5%BF%85%E9%A1%BB%E6%AD%A3%E8%A7%86%E7%9A%84%E5%AE%89%E5%85%A8%E9%99%B7%E9%98%B1/</link>
      <pubDate>Fri, 06 Mar 2026 13:59:57 +0800</pubDate>
      <guid>https://answer.freetools.me/%E9%9B%B6%E5%BE%80%E8%BF%94%E7%9A%84%E4%BB%A3%E4%BB%B7http/3-0-rtt-%E4%B8%BA%E4%BD%95%E6%88%90%E4%B8%BA%E5%BC%80%E5%8F%91%E8%80%85%E5%BF%85%E9%A1%BB%E6%AD%A3%E8%A7%86%E7%9A%84%E5%AE%89%E5%85%A8%E9%99%B7%E9%98%B1/</guid>
      <description>从TLS 1.3的设计困境出发，深度剖析HTTP/3 0-RTT连接重用的安全漏洞。文章基于RFC 8446、RFC 8470、RFC 9001、RFC 9114等官方规范，以及USENIX Security、EuroS&amp;amp;P等顶级会议论文，系统解析0-RTT重放攻击的技术原理、实际威胁场景与防御机制。涵盖Cloudflare的保守策略、425状态码的设计初衷、以及开发者需要遵循的最佳实践。</description>
    </item>
  </channel>
</rss>
