My nsvhr/nsunix patches for 3.2 come with the ability to log and (dump as
hex if needed) everything that comes to the server (and pretty much
everything that leaves the server as well.)
I have found this a very useful utility for debugging communications
modules (nsunix and nsvhr), as well as developing for bizarro webservices.
It turns out that TellMe for example, sends you information as a POST
method that includes query arguments in the request:
POST /foo?phone=5551212
FFFF0012DEADBEEF
If I recall correctly that was befuddling the AOLserver ns_getform routine
which expects GET or POST but not both combined.
Anyway, trivial to examine and inspect with the nsvhr/nsunix patches, even
when you are not running nsvhr/nsunix.
So one suggestion ala packet sniffers, etc., would be to put up an
AOLserver 3.x with my patches applied, then turn "dev" debugging on.
Anyway, does anyone know what that request is doing? It looks short for a
buffer overflow.
Jerry
At 10:52 AM 7/20/01 -0400, Lamar Owen wrote:
>On Friday 20 July 2001 09:41, you wrote:
> > Well, how about that -- 21 failures in my log since Monday morn, all with
> > the following query:
> > /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
>
>I got 78.
>
>No crashes yet. AS 2.3.3/Linux.
>--
>Lamar Owen
>WGCR Internet Radio
>1 Peter 4:11
=====================================================
Jerry Asher [EMAIL PROTECTED]
1678 Shattuck Avenue Suite 161 Tel: (510) 549-2980
Berkeley, CA 94709 Fax: (877) 311-8688