TinyHTTPd | 项目主页 : http : //tinyhttpd
kandi X-RAY | TinyHTTPd Summary
kandi X-RAY | TinyHTTPd Summary
项目主页 : 一个简单的 http 开源服务器, 代码只有几百行, 注释版.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of TinyHTTPd
TinyHTTPd Key Features
TinyHTTPd Examples and Code Snippets
Community Discussions
Trending Discussions on TinyHTTPd
QUESTION
I am studying a tiny web server, it can receive GET-request from browser and return an html file. The serve_file
-function sends response messages to browser, and the get_line
-function gets a line from socket buffer. I don't know why must read & discard request headers. I try to comment the two lines and the browser show a connection reset page. I guess the server socket receive buffer is full, but I don't know the specific reason. Could anyone explain it?
source code
ANSWER
Answered 2018-Oct-27 at 09:34The behavior you observed is a standard socket behavior.
If data received from a peer has not been read by the application and the application calls close
on the socket then OS does not do the usual TCP connection finalization. It resets the connection immediately instead finalization. If application really wants gracefully close the connection when there is unread data in the received buffer then it must call shutdown(socket, SHUT_WR)
before calling close
.
And why is the socket API implemented that way? Because this handling can avoid dos attacks. If close
executes normal TCP session finalization then following attack is possible:
- A malicious client opens a TCP connection
- The server accepts the connection and starts receiving data
- The client sends a continuous stream of let say random data
- The server quickly detects that received data is wrong and calls
close
on the socket. close
just sends aFIN
and then waits for the peer close. Server resources remain allocated because normalFIN
just close the direction towards the client. The client still may send data and the recv buffer would not be freed.
But when the close initiates connection reset then resources related to this TCP connection is freed immediately. A dos attack is then a bit more complicated.
See https://www.spinics.net/lists/linux-c-programming/msg01345.html for more details.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install TinyHTTPd
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page