aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/OpenSim/Region/Framework/Interfaces
diff options
context:
space:
mode:
authorteravus2013-03-05 00:04:09 -0500
committerteravus2013-03-05 00:04:09 -0500
commit69fbcdf14c00fc882477b18af962a932db0d54ee (patch)
tree9eb27654259d0c4c3ff254b4ad5c51bdd6db75eb /OpenSim/Region/Framework/Interfaces
parent* Update LibOMV to f8f8e616b37a7ea22b7922b2331999bc06725bf9 (diff)
downloadopensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.zip
opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.tar.gz
opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.tar.bz2
opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.tar.xz
* Add a Max Payload size property to the Websocket Server Handler. If you would like to restrict the maximum packet size, (and therefore protect against Memory DOSing) then you should set this. I defaulted it to 40MB. This means that in theory, a malicious user could connect and send a packet that claims that the payload is up to 40 mb (even if it doesn't actually turn out to be 40mb. More testing needs to be done on it where the packets are maliciously malformed.
Diffstat (limited to 'OpenSim/Region/Framework/Interfaces')
0 files changed, 0 insertions, 0 deletions