[ https://issues.apache.org/jira/browse/THRIFT-1692?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Ben Craig closed THRIFT-1692. ----------------------------- Resolution: Fixed Fix Version/s: (was: 1.0) 0.9.1 > SO_REUSEADDR allows for socket hijacking on Windows > --------------------------------------------------- > > Key: THRIFT-1692 > URL: https://issues.apache.org/jira/browse/THRIFT-1692 > Project: Thrift > Issue Type: Bug > Components: C++ - Library > Affects Versions: 0.8, 0.9 > Environment: Worst on WinXP, slightly less bad on Win Server 2003+ > Reporter: Ben Craig > Fix For: 0.9.1 > > > SO_REUSEADDR is a fine idea for sockets on POSIX operating systems. > SO_REUSEADDR on Windows operates differently though. This MSDN article > explains the behavior: > http://msdn.microsoft.com/en-us/library/windows/desktop/ms740621.aspx > Long story short, with SO_REUSEADDR, a hostile process owned by another user > can steal your port. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira