Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upGitHub is where the world builds software
Millions of developers and companies build, ship, and maintain their software on GitHub — the largest and most advanced development platform in the world.
Mitigation of attack vectors from external provided links for generic extractor #25141
Comments
|
Since we don't plan to allow live-streams, we could use |
You should bear in mind that remote party may serve different |
|
Thank you for your time & answers. I have come to the conclusion that my requirements are out of the scope of We can write a custom downloader that aligns with our needs and use that when the extractor is I'll most likely leverage |
|
I've re-checked question 2 and looks like it actually silently truncates data at |
Checklist
Question
Are there any mitigation possibilities in place for attacks such as Slowloris or a 3 party url that will indefinitely send data without a
content-length?Does the downloader respect the
content-lengthheader and error out if the downloaded size is a mismatch?I have noticed that there is an option for
--max-filesizebut does that usecontent-lengthor the actual downloaded bytes so far?Is there anything I could do to kill the process if the download speed is lower than a threshold? Or is there any option that would help me achieve this?