Boost logo

Boost :

Subject: Re: [boost] [beast] Security
From: Vinnie Falco (vinnie.falco_at_[hidden])
Date: 2017-07-03 16:47:10

On Mon, Jul 3, 2017 at 9:42 AM, Phil Endecott via Boost
<boost_at_[hidden]> wrote:
> Has it been reviewed by anyone with specific experience of how
> HTTP can be attacked? Has it been "fuzzed"?

I would love for someone to do a security audit and in the absence of
a volunteer I will likely take on the expense myself.

That said, I have made the tests quite extensive. 100% code coverage
is always an ongoing goal. All branches which handle failure are
checked, and there is a concept called "bufgrind" where all possible
2-buffer combinations of inputs are tested. This means for a message
of size N it is split up into two buffers x and N-x and fed to the
parser. You can see that stuff here:

You can see that coverage is extremely high:

Note that the review branch is missing some tests which I have since
added, so actual coverage is higher than what is displayed here.

Boost list run by bdawes at, gregod at, cpdaniel at, john at