Hi

I got a DOS(Denial Of Service) attack scenario on http server in
busybox. At present I am using busybox 1.2 version.

Following is the transmission steps between Client and Server

1.      3 way handshake
2.      GET packet from client and then followed by ACK from server.
3.      RST ACK from Client to Server

As a result of RST_ACK packet from client the socket connection is
getting terminated abruptly and cur_clients global variable is not
getting decremented. Once cur_clients value reaches the max value of 5
it stops accepting the new connections.

Is there any fix for this issue for HTTP server in busybox for new
releases after 1.2 ??

Sorry I havent found any specific fixes for this issues and I wanted
to know if any of them seeing this issue got fixed in new busybox
version ?

-- 
Thanks,

codingfreak
---------------------------------------------
www.codingfreak.blogspot.com
_______________________________________________
busybox mailing list
[email protected]
http://lists.busybox.net/mailman/listinfo/busybox

Reply via email to