network-protocols

Risk of exploits "backwards" into outbound tcp connections.

I am building a server application that will maintain connections to other applications by initiating TCP connections out through a firewall that is only open for outbound traffic to the relevant IP's ports that the application will connect to. What is the risk of someone having taken over the machine(s) we connect to being able to expl...

Behavior of connect() with TCP

I call connect() on the client. The client enters the SYN_SENT state and sends a SYN. Now it gets a SYN with no ACK in it, so the client enters the SYN_RCVD state. Does connect() return at this point? Technically you have enough information to be able to call send() and recv() on the socket. The RFC itself says, if you call SEND on a s...

What is the best practice for documenting network protocol?

I have a couple applications that communicate over TCP/UDP sockets. Each one has a different set of commands (protocol) that it follows and different expected returns. I've been trying to compile a list of commands with parameters, types, return values, error codes, exceptions, etc. but I'm stuck on formatting it. Example command (a s...

For boost-asio network programming whats the best approach for processing the response?

Im new to network programming and in particular to async-processes. Start also new with the boost-lib Im implementing a class, to access an imap-server. I can send and receive the commands and the response, in general The response is queued in a dequeue inside the class. I put simple the response lines in the queue, for further process...

How do I write code to get through NAT in a similar way to Skype?

Does anyone knows, how skype redirect NAT and FireWalls? ...

Available Game network protocol definition languages and code generation

I've been looking for a good general purpose binary network protocol definition framework to provide a way to write real-time game servers and clients (think World Of Warcraft or Quake III) in multiple languages (e.g. Java backend server and iPhone front-end client written in Objective-C and Cocoa). I want to support Java Flash clients...

Which encoding is used by the HTTP protocol?

When a browser sends an HTTP request to a web server, what encoding is used to encode the HTTP protocol on the wire? Is it ASCII? UTF8? or UTF16? Or does it specify which encoding it uses in a predefined format (before any decoding takes place?) P.S I'm not asking about the actual payload (e.g. HTML) of the request/response. I'm asking ...

How would you solve this data parsing problem?

This is a rather long question, so please bare with me. We are implementing an emulator for a piece of hardware that is being developed at the same time. The idea is to give 3rd parties a software solution to test their client software and give the hardware developers a reference point to implement their firmware. The people who wrote ...

i want redirect tcp packets to user space using netlink raw sockets with netlink_firewall option

can have some sample programs using netlink sockets with firewall protocol. i found but giving some errors like segfault core dump. and error code -22. so need better one iam very new for socket programing. please help me ...

Application level checksumming as the tcp checksumming might be too weak?

This Paper (When the CRC and TCP checksum disagree) suggests that since the TCP checksumming algorithm is rather weak, there would occur an undetected error every 16 million to 10 billion packets using TCP. Are there any application developers out there who protect the data against such kind of errors by adding checksums at the applicat...

UDP client not reachable in Java

Hi I am running a simple UDP Java Server, which collects IP and Port of Client when connected, store information in Database. Client is still listening to server. Server stops. Later, server want to reuse the database information, to reach the client; and as the client is still listening to same port of server, I guess client shoul...

Why can't I connect with a non-browser application to this url?

Hi, Anyone knows why this url rejects connection requests being sent by a non-browser application (wget,curl, elinks!): http://sube.garanti.com.tr https://sube.garanti.com.tr/isube/login/en It's my bank account and I'm trying to make my transfers with a script but as you see this super secured servers do not allow me. Any suggestions...

reliable multicast in C#

Hi, what are my options for reliable multicast in c# /.Net 3.5? I don’t want to use MSMQ. I am open to commercial as well as open source options. Thanks ...

How to measure network performance (how to benchmark network protocol)

First, a bit of background. There are many various comparison of distributed version control systems (DVCS) which compare size of repository, or benchmark speed of operations. I haven't found any that would benchmark network performance of various DVCS, and various protocols used... beside measuring speed of operations (commands) involvi...

What are the perceived/actual advantages of Kerberos? Are there any viable alternatives to the technology?

We are planning on utilising kerberos in our architecture. I would like to know what perceived or actual advantages this technology has, and if there are any alternatives. Note that we have a .net client side and java server side. communication will be via messaging bus and SOA ...

Optimizing protocol opening operation over tcp connection opening

I'm designing a new protocol called DITP. It is a connection oriented protocol that would use TCP as transport layer. With common Internet protocols, when the TCP connection is established, the server starts by sending a greeting message to what the client respond, eventually sending its first request. I figured out I could save one rou...

Code to do a direct DNS lookup

I'm thinking of running an experiment to track DNS values in different ways (like how often they change and whatnot). To do this I will need to be able to make a DNS request directly to a server so that 1) I known what server it came from, 2) I can request responses from several servers and 3) I can avoid the local OS run cache. Does an...

How does the Half-Life 2 multiplayer protocol work?

I was wondering how the Half-Life 2 multiplayer protocol works in mods like Counter-Strike: Source or Day Of Defeat: Source. I believe that they use some kind of obfuscation and proprietary compression algorithm. I would like to know how different kinds of messages are encoded in a packet. ...

What does BGP Path Attribute Type 18 refer to?

Does anyone know what Path Attribute Type 18 refers to and how to parse it? The best I can understand is that it is a new AGGREGATOR (type 7) and I'm assuming that it's reading the new AS32 format, but that's not cutting it because I can't parse this packet. Is there an RFC that describes how this works...is it something special that C...

How can I learn _really_ low-level network programming?

So I want to learn all about networks. Well below the socket, down to raw sockets and stuff. And I want to understand hubs, routers, access points, etc. For example, I'd like to be able to write my own software to do this kind of stuff.* Is there a great source for this kind of information? I know that I'm asking a LOT here, and tha...