-
-
Notifications
You must be signed in to change notification settings - Fork 31.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Severe open file leakage running asyncio SSL server #74156
Comments
Original report at old repo here: python/asyncio#483 There this is reported fixed by #480 I wish to report that whilst the above patch might have a small positive effect, it is far from solving the actual issue. Several users report eventual exhaustion of the open file resource running SSL asyncio servers. Here are graphs provided by a friend running my ElectrumX server software, first accepting SSL connections and the second accepting TCP connections only. Both of the servers were monkey-patched with the pull-480 fix above, so this is evidence it isn't solving the issue. As you can see, the TCP server (which has far less connections; most users use SSL) has no leaked file handles, whereas the SSL server has over 300. This becomes an easy denial of service vector against asyncio servers. One way to trigger this (though I doubt it explains the numbers above) is simply to connect to the SSL server from telnet, and do nothing. asyncio doesn't time you out, the telnet session seems to sit there forever, and the open file resources are lost in the SSL handshake stage until the remote host kindly decides to disconnect. I suspect these resource issues all revolve around the SSL handshake process, certainly at the opening of a connection, but also perhaps when closing. As the application author I am not informed by asyncio of a potential connection until the initial handshake is complete, so I cannot do anything to close these phantom socket connections. I have to rely on asyncio to be properly handling DoS issues and it is not currently doing so robustly. |
I'm assigning this to myself to make sure I don't forget about this. If someone wants to tackle this please feel free to reassign. |
question is, should asyncio handle timeouts or leave it to caller? #480 fixes leak during handshake. |
@nikolay Kim As I note in the original submission, 480 was tested and does NOT solve this issue. Thanks. |
I see. this is server specific problem. as a temp solution I'd use proxy for ssl termination. |
I'm not sure what you mean about this being a server-specific problem. It's clearly a bug in the asyncio SSL wrapper as using TCP instead of SSL with otherwise identical code doesn't leak open files. |
I think there's been some confusion about what PR 480 was meant to fix - it helps in cases where connections are closed during handshake, but if a server connection is waiting for a handshake but never receives any data at all then it stays in that state forever. As for a fix, how about giving SSLProtocol a method like: def checkHandshakeDone(self):
if self._in_handshake == True:
self._abort() and then at the end of _start_handshake() adding: self._loop.call_later(10, self.checkHandshakeDone) Then if the handshake is not complete within ten seconds of starting, the connection will be aborted. |
Fixed in 3.7 |
Should we backport this to 3.6? This is a security issue. |
The fix introduces a new parameter in public API. That's why I think we shouldn't backport it. |
Maybe we can get away with this if we do not document it in 3.6 and add a comment to the source code that using this new parameter will make the code incompatible with earlier 3.6.x versions? |
Don't know. |
Note: these values reflect the state of the issue at the time it was migrated and might not reflect the current state.
Show more details
GitHub fields:
bugs.python.org fields:
The text was updated successfully, but these errors were encountered: