Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 9AA8E200BBE for ; Thu, 27 Oct 2016 21:46:03 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 9974B160AE6; Thu, 27 Oct 2016 19:46:03 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id E3E99160AF6 for ; Thu, 27 Oct 2016 21:46:02 +0200 (CEST) Received: (qmail 16808 invoked by uid 500); 27 Oct 2016 19:46:01 -0000 Mailing-List: contact dev-help@community.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@community.apache.org Delivered-To: mailing list dev@community.apache.org Received: (qmail 16516 invoked by uid 99); 27 Oct 2016 19:46:01 -0000 Received: from mail-relay.apache.org (HELO mail-relay.apache.org) (140.211.11.15) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 27 Oct 2016 19:46:01 +0000 Received: from mail-yb0-f169.google.com (mail-yb0-f169.google.com [209.85.213.169]) by mail-relay.apache.org (ASF Mail Server at mail-relay.apache.org) with ESMTPSA id 9CCA11A06CE for ; Thu, 27 Oct 2016 19:46:00 +0000 (UTC) Received: by mail-yb0-f169.google.com with SMTP id g68so27896275ybi.0 for ; Thu, 27 Oct 2016 12:46:00 -0700 (PDT) X-Gm-Message-State: ABUngvfChYLXTgFx/o59oUwwNccV7dcw90XJ25tXTTSLG7gDvojRrJGN+hFNPGqqDo0UcUGNpVo+l4jejoky3w== X-Received: by 10.37.56.82 with SMTP id f79mr8629843yba.94.1477597559514; Thu, 27 Oct 2016 12:45:59 -0700 (PDT) MIME-Version: 1.0 Received: by 10.13.217.10 with HTTP; Thu, 27 Oct 2016 12:45:58 -0700 (PDT) Received: by 10.13.217.10 with HTTP; Thu, 27 Oct 2016 12:45:58 -0700 (PDT) In-Reply-To: <31AB1BB0CC26394A97147E6FD09B58EAB32F29A2@szxema508-mbs.china.huawei.com> References: <31AB1BB0CC26394A97147E6FD09B58EAB32F29A2@szxema508-mbs.china.huawei.com> From: Flavio P JUNQUEIRA Date: Thu, 27 Oct 2016 20:45:58 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: Dear Community,we find a Vulnerability in Zookeeper/SOLR/Apache(PHP) about tcp connection exhausted,Waiting for your reply To: Zookeeper Cc: Xionglongsheng , "dev@lucene.apache.org" , Shifeiye , Shuzhihui , Liubeijia , "dev@community.apache.org" , Chenchu Content-Type: multipart/alternative; boundary=94eb2c09d8e0a7f397053fddfd61 archived-at: Thu, 27 Oct 2016 19:46:03 -0000 --94eb2c09d8e0a7f397053fddfd61 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Please read this: http://zookeeper.apache.org/security.html -Flavio On 27 Oct 2016 20:16, "Linkezhang" wrote: > *Problem:* > > In the client using some method (such as telnet) to establish a tcp > connection with server-side apache listening port , but after the > establishment of tcp connection, the client does not send any data. > However, apache will not disconnect this tcp connection, may lead to the > number of connections exhausted , Resulting in DOS > > > > *The attack process**=EF=BC=9A* > 1. The client executes the telnet service port > > [image: cid:image001.png@01D23070.DA903540] > Start the client telnet server port 60000, do not exit for a long time: > > Excuting an order: > telnet 172.22.17.26 60000 > > > --94eb2c09d8e0a7f397053fddfd61--