diff options
author | teravus | 2013-03-05 00:04:09 -0500 |
---|---|---|
committer | teravus | 2013-03-05 00:04:09 -0500 |
commit | 69fbcdf14c00fc882477b18af962a932db0d54ee (patch) | |
tree | 9eb27654259d0c4c3ff254b4ad5c51bdd6db75eb /Prebuild/tests/include-002.prebuild | |
parent | * Update LibOMV to f8f8e616b37a7ea22b7922b2331999bc06725bf9 (diff) | |
download | opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.zip opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.tar.gz opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.tar.bz2 opensim-SC_OLD-69fbcdf14c00fc882477b18af962a932db0d54ee.tar.xz |
* Add a Max Payload size property to the Websocket Server Handler. If you would like to restrict the maximum packet size, (and therefore protect against Memory DOSing) then you should set this. I defaulted it to 40MB. This means that in theory, a malicious user could connect and send a packet that claims that the payload is up to 40 mb (even if it doesn't actually turn out to be 40mb. More testing needs to be done on it where the packets are maliciously malformed.
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions