Browse Source

Now limit full scrape to requests sending exactly "GET /scrape HTTP/"

dynamic-accesslists
erdgeist 17 years ago
parent
commit
c59e44ba94
  1. 22
      opentracker.c

22
opentracker.c

@ -379,6 +379,17 @@ LOG_TO_STDERR( "stats: %d.%d.%d.%d - mode: s24s old\n", h->ip[0], h->ip[1], h->i @@ -379,6 +379,17 @@ LOG_TO_STDERR( "stats: %d.%d.%d.%d - mode: s24s old\n", h->ip[0], h->ip[1], h->i
/* We want the pure plain un-unescaped text */
memmove( static_tmpbuf, static_inbuf, 8192 );
/* Full scrape... you might want to limit that */
if( !byte_diff( data, 12, "scrape HTTP/" ) ) {
LOG_TO_STDERR( "scrp: %d.%d.%d.%d - FULL SCRAPE\n", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
write( 2, static_tmpbuf, l );
if( !( reply_size = return_fullscrape_for_tracker( &reply ) ) ) HTTPERROR_500;
ot_overall_tcp_successfulannounces++;
return sendmmapdata( s, reply, reply_size );
}
/* This is to hack around stupid clients that just replace
"announce ?info_hash" with "scrape ?info_hash".
We do not want to bomb them with full scrapes */
@ -406,15 +417,8 @@ SCRAPE_WORKAROUND: @@ -406,15 +417,8 @@ SCRAPE_WORKAROUND:
}
}
/* Scanned whole query string, no hash means full scrape... you might want to limit that */
if( !scrape_count ) {
LOG_TO_STDERR( "scrp: %d.%d.%d.%d - FULL SCRAPE\n", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
write( 2, static_tmpbuf, l );
write( 2, "\n\n\n", 1 );
if( !( reply_size = return_fullscrape_for_tracker( &reply ) ) ) HTTPERROR_500;
ot_overall_tcp_successfulannounces++;
return sendmmapdata( s, reply, reply_size );
}
/* No info_hash found? Inform user */
if( !scrape_count ) HTTPERROR_400_PARAM;
/* Enough for http header + whole scrape string */
if( !( reply_size = return_tcp_scrape_for_torrent( multiscrape_buf, scrape_count, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) ) HTTPERROR_500;

Loading…
Cancel
Save