Networks are the number 1 attack vector yet it's always difficult to 
communicate the risks convincingly.  This is best addressed in the protocol 
design and security is easiest to implement when the framework has a natural 
solution.  Limiting max request length isn't what the auditors would like.

-- 
You received this message because you are subscribed to the Google Groups 
"grpc.io" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/grpc-io/20AEAF0A-27A0-404A-875B-3B68B2C086D8%40gmail.com.

Reply via email to