Michi Mutsuzaki created ZOOKEEPER-1485:
------------------------------------------

             Summary: client xid overflow is not handled
                 Key: ZOOKEEPER-1485
                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-1485
             Project: ZooKeeper
          Issue Type: Bug
          Components: c client, java client
    Affects Versions: 3.3.5, 3.4.3
            Reporter: Michi Mutsuzaki


Both Java and C clients use signed 32-bit int as XIDs. XIDs are assumed to be 
non-negative, and zookeeper uses some negative values as special XIDs (e.g. -2 
for ping, -4 for auth). However, neither Java nor C client ensures the XIDs it 
generates are non-negative, and the server doesn't reject negative XIDs.

Pat had some suggestions on how to fix this:

- (bin-compat) Expire the session when the client sends a negative XID.
- (bin-incompat) In addition to expiring the session, use 64-bit int for XID so 
that overflow will practically never happen.

--Michi

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to