Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Reject invalid "Sec-WebSocket-Key" headers from clients#360

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
nhooyr merged 5 commits intocoder:devfromEmyrk:emyrk/Sec-WebSocket-Key
Oct 19, 2023
Merged

Reject invalid "Sec-WebSocket-Key" headers from clients#360

nhooyr merged 5 commits intocoder:devfromEmyrk:emyrk/Sec-WebSocket-Key
Oct 19, 2023

Conversation

Emyrk
Copy link
Member

Client "Sec-WebSocket-Key" should be a valid 16 byte base64 encoded nonce. If the header is not valid, the server should reject the client.

DeanPDX reacted with thumbs up emoji
@Emyrk
Copy link
MemberAuthor

@nhooyr this was brought up by a security consultant. Would be great to get this in so we do not need to handle this at a layer above the websocket library.

@nhooyrnhooyr added this to thev1.8.8 milestoneOct 13, 2023
@nhooyrnhooyr changed the base branch frommaster todevOctober 14, 2023 13:15
Copy link
Contributor

@nhooyrnhooyr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Will get this in for v1.8.8. But I need to mention that it was entirely intentional on my end as it's a useless check mandated by the RFC. This isn't a security issue whatsoever and so I decided to ignore the RFC here and not waste CPU cycles on checking. But I can understand that as this library gets more usage it's important to stick to the letter of the RFC to satisfy consultants and process.

Also for anyone testing their websocket implementation against my own, it's good to error here as other libraries may not be flexible.

Emyrk reacted with thumbs up emoji
@nhooyr
Copy link
Contributor

Will fix the merge conflicts myself.

Emyrk reacted with thumbs up emoji

@nhooyrnhooyr merged commit10137fa intocoder:devOct 19, 2023
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Reviewers
1 more reviewer

@nhooyrnhooyrnhooyr approved these changes

Reviewers whose approvals may not affect merge requirements
Assignees
No one assigned
Labels
None yet
Projects
None yet
Milestone
v1.8.8
Development

Successfully merging this pull request may close these issues.

2 participants
@Emyrk@nhooyr

[8]ページ先頭

©2009-2025 Movatter.jp