Simple, for example, one based on TCP/IP server and the client to the server by sign in, after successful long connections, then the question and answer to communicate Message format is probably: Baotou: 1 byte packet type + 2 packet length + 14 bytes timestamp Inclusions:
The server to unpack to received data, such as a sign-in request packet is 50 bytes, but in public, may be 50 bytes were broken into two or three packets, so the service side after receiving at least three bytes, continue to wait to receive the rest of the 47 bytes, the TCP connection will continue to the back of the logical processing
If an attacker at least 3 bytes of data sent to the server, and the subsequent 20 bytes, then keep the connection will no longer send data, it will cause server TCP connection resources have been meaningless possession, the connection is much, cause server resources waste,
This attack is usually how to prevent?
CodePudding user response:
If you don't set the timeout of TCP, and long connection if it's not quite so disguised DDOS, this in the firewall or the LINUX kernel mechanism must be set on itself KEEP ALIVE the timeout mechanism