Message152106
| Author |
johzimme |
| Recipients |
johzimme, pitrou |
| Date |
2012年01月27日.17:59:26 |
| SpamBayes Score |
0.013337285 |
| Marked as misclassified |
No |
| Message-id |
<C0B8D844FF273B49AA6F0BDA44B9EBD70643F869@XMB-RCD-102.cisco.com> |
| In-reply-to |
<1327686406.54.0.709266031712.issue13891@psf.upfronthosting.co.za> |
| Content |
Thanks for your quick response, I downloaded the ISIC tool and used the following command to identify the problem:
udpsic -s rand -d server-ip-address,port
where port is 514 (syslogd) which uses a python script to process the incoming messages.
The command 'netstat -lnup | grep 514' shows python as the bound application.
Thanks,
John
-----Original Message-----
From: Antoine Pitrou [mailto:report@bugs.python.org]
Sent: Friday, January 27, 2012 12:47 PM
To: John Zimmerman (johzimme)
Subject: [issue13891] CPU DoS With Python's socket module
Antoine Pitrou <pitrou@free.fr> added the comment:
What do you call "malformed UDP packets" and how should they be detected by the library?
----------
nosy: +pitrou
_______________________________________
Python tracker <report@bugs.python.org>
<http://bugs.python.org/issue13891>
_______________________________________ |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2012年01月27日 17:59:27 | johzimme | set | recipients:
+ johzimme, pitrou |
| 2012年01月27日 17:59:27 | johzimme | link | issue13891 messages |
| 2012年01月27日 17:59:26 | johzimme | create |
|