this will stuck when i accept 29127times
https://github.com/exablaze-oss/exanic-software/blob/9b1f69cfa252402cd1f0dbe9ba4115ed51d0ae7a/modules/exasock/exasock-tcp.c#L2586
the offs + sizeof(struct exa_tcp_new_connection) will be large than RX_BUFFER_SIZE and the rx_lock will dead lock
https://github.com/exablaze-oss/exanic-software/blob/9b1f69cfa252402cd1f0dbe9ba4115ed51d0ae7a/modules/exasock/exasock-tcp.c#L2589
I have used the Epoll frame in the server when I found this, and my client is like this:
server_msg=(addr, port)
while True:
client_sock = socket.socket()
client_sock.connect(server_msg)
client_sock.close()
I run the exasock at the server , and the version is 2.4.1
this is so confusing to me
How can I defense this attack