Read this by @majek04. Then think about the attack this is needed to prevent. TCP as specified is not adversarial. https://blog.cloudflare.com/this-is-strictly-a-violation-of-the-tcp-specification/ …
Well in the article the peer close()d socket rather than just shutdown(SHUT_WR). So why can't kernel reap it?
-
-
no, wait, the client side is reaped. The server side did NOT call close() (root cause), and leaked, and dangled
-
Right. I'm saying, if the peer (client) fully closed the socket, I can't see any motive for CLOSE_WAIT.
-
ah, right. I don’t think the client has a way to communicate a full close of a socket, though. FIN is 1W close.
-
RST is a full close
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.