[ https://issues.apache.org/jira/browse/THRIFT-1692?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13682245#comment-13682245 ]
Ben Craig commented on THRIFT-1692: ----------------------------------- This has been fixed in the recent porting mega-patch > SO_REUSEADDR allows for socket hijacking on Windows > --------------------------------------------------- > > Key: THRIFT-1692 > URL: https://issues.apache.org/jira/browse/THRIFT-1692 > Project: Thrift > Issue Type: Bug > Components: C++ - Library > Affects Versions: 0.8, 0.9 > Environment: Worst on WinXP, slightly less bad on Win Server 2003+ > Reporter: Ben Craig > Fix For: 1.0 > > > SO_REUSEADDR is a fine idea for sockets on POSIX operating systems. > SO_REUSEADDR on Windows operates differently though. This MSDN article > explains the behavior: > http://msdn.microsoft.com/en-us/library/windows/desktop/ms740621.aspx > Long story short, with SO_REUSEADDR, a hostile process owned by another user > can steal your port. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira