Uploaded image for project: 'Thrift'
  1. Thrift
  2. THRIFT-1692

SO_REUSEADDR allows for socket hijacking on Windows

VotersWatch issueWatchersLinkCloneUpdate Comment AuthorReplace String in CommentUpdate Comment VisibilityDelete Comments
    XMLWordPrintableJSON

    Details

    • Type: Bug
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: 0.8, 0.9
    • Fix Version/s: 0.9.1
    • Component/s: C++ - Library
    • Labels:
      None
    • Environment:

      Worst on WinXP, slightly less bad on Win Server 2003+

      Description

      SO_REUSEADDR is a fine idea for sockets on POSIX operating systems. SO_REUSEADDR on Windows operates differently though. This MSDN article explains the behavior:
      http://msdn.microsoft.com/en-us/library/windows/desktop/ms740621.aspx

      Long story short, with SO_REUSEADDR, a hostile process owned by another user can steal your port.

        Attachments

          Activity

            People

            • Assignee:
              Unassigned
              Reporter:
              ben.craig Ben Craig

              Dates

              • Created:
                Updated:
                Resolved:

                Issue deployment