[issue45795] urllib http client vulnerable to DOS attack

2021-11-26 Thread Muhammad Farhan
Muhammad Farhan added the comment: Hi, Hope all of you are doing good. Looks like you guys are not interested in this issue. Can you please provide me the source code for yhe urllib, I will fix it myself -- ___ Python tracker <ht

[issue45795] urllib http client vulnerable to DOS attack

2021-11-18 Thread Muhammad Farhan
Muhammad Farhan added the comment: Maximum time in seconds that you allow the whole operation to take. This is useful for preventing your batch jobs from hanging for hours due to slow networks or links going down. Since 7.32.0, this option accepts decimal values, but the actual timeout

[issue45795] urllib http client vulnerable to DOS attack

2021-11-18 Thread Muhammad Farhan
Muhammad Farhan added the comment: So, the idea is to make timeout for the whole operation and it should not reset in any case. -- ___ Python tracker <https://bugs.python.org/issue45

[issue45795] urllib http client vulnerable to DOS attack

2021-11-18 Thread Muhammad Farhan
Muhammad Farhan added the comment: See the max_time.png and curl.png -- Added file: https://bugs.python.org/file50449/curl.png ___ Python tracker <https://bugs.python.org/issue45

[issue45795] urllib http client vulnerable to DOS attack

2021-11-18 Thread Muhammad Farhan
Muhammad Farhan added the comment: Yes, other clients like curl does not reset the timeout See the attached screenshots for references. -- Added file: https://bugs.python.org/file50448/max_time.png ___ Python tracker <https://bugs.python.

[issue45795] urllib http client vulnerable to DOS attack

2021-11-15 Thread Muhammad Farhan
Muhammad Farhan added the comment: Is any one going to respond? -- ___ Python tracker <https://bugs.python.org/issue45795> ___ ___ Python-bugs-list mailin

[issue45795] urllib http client vulnerable to DOS attack

2021-11-12 Thread Muhammad Farhan
New submission from Muhammad Farhan : Hi, During my recent tests I have discovered that the urllib http client (urllib.request.urlopen()) is vulnerable to DOS attack using a simple but effective trick. I am attaching a file named server.py download it and run it using latest version