On 3 Dec 2003 at 14:26, Stas Bekman wrote: Hi Stas and Ged
Many thanks for your great support! READLINE works perfectly! regards, Josi Ender > Ged Haywood wrote: > > Hi Stas, > > > > On Wed, 3 Dec 2003, Stas Bekman wrote: > > > > > >>{ local $/; my $post_data = <STDIN>; } # [snip] > > BTW, that local $/ is not needed because mp1 implements READLINE as: > > #shouldn't use <STDIN> anyhow, but we'll be nice > sub READLINE { > my $r = shift; > my $line; > $r->read($line, $r->header_in('Content-length')); > $line; > } > > It's a good practice to keep it though and not rely on the particular > implementation. > > >>The above technique is a wide open invitation for DoS attacks... > > > > > > I'm not sure that the technique bears full responsibility for any > > DoS risk, but even so I don't think I impled that my one line of code > > reduced the need for vigilance... :) > > Sure, I wasn't attributing anything to your code Ged, just extending on the > topic, for those unware. Most users use CGI.pm and Apache::Request which give > you the tools to deal with DoS. So this is just for those who do it on their own. > > In fact as you can see above Apache's READLINE is DoS-prone (since it reads > the whole C-L). > > > __________________________________________________________________ > Stas Bekman JAm_pH ------> Just Another mod_perl Hacker > http://stason.org/ mod_perl Guide ---> http://perl.apache.org > mailto:[EMAIL PROTECTED] http://use.perl.org http://apacheweek.com > http://modperlbook.org http://apache.org http://ticketmaster.com > -- Reporting bugs: http://perl.apache.org/bugs/ Mail list info: http://perl.apache.org/maillist/modperl.html