EXTERNAL: OSError: [Errno 48] Address already in use
On Thu, 28 Jun 2018 23:27:38 +0300, Marko Rauhamaa wrote:
> Dan Stromberg <drsalists at gmail.com>:
>> On Wed, Jun 27, 2018 at 10:31 PM, Marko Rauhamaa <marko at pacujo.net>
>>> Dan Stromberg <drsalists at gmail.com>:
>>> >> > The problem can be solved by turning on the SO_REUSEADDR flag of
>>> >> > the socket.
>>> > BTW, it's a security feature you're turning off. If you're on a
>>> > multiuser box, it prevents a second user from stealing lingering
>>> > connections from a first user on the same port.
>>> Can you provide a brief proof of concept?
> I'm sorry but I couldn't find a working example behind the link. Could
> you demonstrate the problem with a few lines of Python.
Do you think attackers are limited to a few lines of Python?
If you are asking from academic curiosity, limited by care factor ("I
care about this enough to read a few lines of Python but not 100 lines or
20 lines of C...") that's fair enough.
But if you're trying to express skepticism that this is a genuine
concern, then "a few lines of Python" is an unreasonable limitation.
"Ever since I learned about confirmation bias, I've been seeing
it everywhere." -- Jon Ronson