TinyHTTPd | 项目主页 : http : //tinyhttpd

 by   0xc9e36 C Version: Current License: No License

kandi X-RAY | TinyHTTPd Summary

kandi X-RAY | TinyHTTPd Summary

TinyHTTPd is a C library. TinyHTTPd has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.

项目主页 : 一个简单的 http 开源服务器, 代码只有几百行, 注释版.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              TinyHTTPd has a low active ecosystem.
              It has 8 star(s) with 5 fork(s). There are 1 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              TinyHTTPd has no issues reported. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of TinyHTTPd is current.

            kandi-Quality Quality

              TinyHTTPd has no bugs reported.

            kandi-Security Security

              TinyHTTPd has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              TinyHTTPd does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              TinyHTTPd releases are not available. You will need to build from source code and install.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TinyHTTPd
            Get all kandi verified functions for this library.

            TinyHTTPd Key Features

            No Key Features are available at this moment for TinyHTTPd.

            TinyHTTPd Examples and Code Snippets

            No Code Snippets are available at this moment for TinyHTTPd.

            Community Discussions

            QUESTION

            Why web server should clear away socket receive buffer before sending response?
            Asked 2018-Oct-27 at 09:34

            I am studying a tiny web server, it can receive GET-request from browser and return an html file. The serve_file-function sends response messages to browser, and the get_line-function gets a line from socket buffer. I don't know why must read & discard request headers. I try to comment the two lines and the browser show a connection reset page. I guess the server socket receive buffer is full, but I don't know the specific reason. Could anyone explain it?
            source code

            ...

            ANSWER

            Answered 2018-Oct-27 at 09:34

            The behavior you observed is a standard socket behavior.

            If data received from a peer has not been read by the application and the application calls close on the socket then OS does not do the usual TCP connection finalization. It resets the connection immediately instead finalization. If application really wants gracefully close the connection when there is unread data in the received buffer then it must call shutdown(socket, SHUT_WR) before calling close.

            And why is the socket API implemented that way? Because this handling can avoid dos attacks. If close executes normal TCP session finalization then following attack is possible:

            • A malicious client opens a TCP connection
            • The server accepts the connection and starts receiving data
            • The client sends a continuous stream of let say random data
            • The server quickly detects that received data is wrong and calls close on the socket.
            • close just sends a FIN and then waits for the peer close. Server resources remain allocated because normal FIN just close the direction towards the client. The client still may send data and the recv buffer would not be freed.

            But when the close initiates connection reset then resources related to this TCP connection is freed immediately. A dos attack is then a bit more complicated.

            See https://www.spinics.net/lists/linux-c-programming/msg01345.html for more details.

            Source https://stackoverflow.com/questions/53005266

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install TinyHTTPd

            You can download it from GitHub.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/0xc9e36/TinyHTTPd.git

          • CLI

            gh repo clone 0xc9e36/TinyHTTPd

          • sshUrl

            git@github.com:0xc9e36/TinyHTTPd.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link