-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove references to WhoTheFAreU?
from replay server/client code
#9
Comments
WhoTheFAreU?
from replay_server codeWhoTheFAreU?
from replay server/client code
I have changed this message to SuspiciousClientIP! in the branch remove-ambiguous-references. The following change requires changing the client side as well. @nkinkade do you have an idea how we can reproduce this event? Do we have logs or something that shows what triggered this event? |
I believe it's when you establish a TCP connection on an unexpected port and/or send unexpected data on that port---all without have a sidechannel estblished. |
Okey, I have been trying to test this, but I seem to keep failing to re-create such incident. Things I tried:
I guess we can for now just change the message to "SuspiciousClientIP!" and be optimistic that nothing break. In worst case scenario I would expect the replay to simply just fail without affecting the server. Changes are in the attached branch, and ready to be merged. |
I’m ok with that!
…On Mon, May 8, 2023 at 3:24 PM zeinab shmeis ***@***.***> wrote:
Okey, I have been trying to test this, but I seem to keep failing to
re-create such incident.
Things I tried:
- modify source IP of incoming packets so that the replay packets have
different IP from the side channel packets. Results is that the socket
closes and replay is not performed.
- modify the replayTrace file so that the payload size and/or content
is different. For the size, the socket just closes because of TO for not
receiving anything. For the content, the replay continues successfully.
I guess we can for now just change the message to "SuspiciousClientIP!"
and be optimistic that nothing break. In worst case scenario I would expect
the replay to simply just fail without affecting the server.
—
Reply to this email directly, view it on GitHub
<#9 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AACOPSOZRM7HR5JBTQP6VQTXFFB6BANCNFSM6AAAAAAWFUOF5E>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
This message show up a few times in the code:
The message was probably meant to be amusing or funny when it was added a long time ago, and surely almost nobody will ever encounter it. However, recently an M-Lab site host actually shut down and entire M-Lab site because they thought that the servers were compromised and had been defaced. It would probably be better to change that message to something slightly more benign, possibly with a link to a page about what Wehe is.
The text was updated successfully, but these errors were encountered: