[
https://issues.apache.org/jira/browse/THRIFT-1692?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Ben Craig closed THRIFT-1692.
-----------------------------
Resolution: Fixed
Fix Version/s: (was: 1.0)
0.9.1
> SO_REUSEADDR allows for socket hijacking on Windows
> ---------------------------------------------------
>
> Key: THRIFT-1692
> URL: https://issues.apache.org/jira/browse/THRIFT-1692
> Project: Thrift
> Issue Type: Bug
> Components: C++ - Library
> Affects Versions: 0.8, 0.9
> Environment: Worst on WinXP, slightly less bad on Win Server 2003+
> Reporter: Ben Craig
> Fix For: 0.9.1
>
>
> SO_REUSEADDR is a fine idea for sockets on POSIX operating systems.
> SO_REUSEADDR on Windows operates differently though. This MSDN article
> explains the behavior:
> http://msdn.microsoft.com/en-us/library/windows/desktop/ms740621.aspx
> Long story short, with SO_REUSEADDR, a hostile process owned by another user
> can steal your port.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira