
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
github.com/tevino/tcp-shaker
This package is used to perform TCP handshake without ACK, which useful for TCP health checking.
HAProxy does this exactly the same, which is:
This implementation has been running on tens of thousands of production servers for years.
In most cases when you establish a TCP connection(e.g. via net.Dial
), these are the first three packets between the client and server(TCP three-way handshake):
This package tries to avoid the last ACK when doing handshakes.
By sending the last ACK, the connection is considered established.
However, as for TCP health checking the server could be considered alive right after it sends back SYN-ACK,
that renders the last ACK unnecessary or even harmful in some cases.
By avoiding the last ACK
The second one is essential because it bothers the server less.
This means the application level server will not notice the health checking traffic at all, thus the act of health checking will not be considered as some misbehavior of client.
There is a fake implementation for non-Linux platform which is equivalent to:
conn, err := net.DialTimeout("tcp", addr, timeout)
conn.Close()
The reason for a fake implementation is that there is currently no way to perform an equivalent operation on certain platforms, specifically macOS. A fake implementation is a degradation on those platforms and ensures a successful compilation.
import (
tcpshaker "github.com/tevino/tcp-shaker"
)
// Get the global singleton Checker instance
checker := tcpshaker.DefaultChecker()
// Checking example.com
err := checker.CheckAddr("example.com:80", time.Second)
switch err {
case ErrTimeout:
fmt.Println("Connect timed out after 1s")
case nil:
fmt.Println("Connect succeeded")
default:
fmt.Println("Error occurred while connecting: ", err)
}
For fine-grained control of the lifecycle of the Checker
.
// Initializing the checker
// Only a single instance is needed and it's safe to use among goroutines.
checker := NewChecker()
ctx, stopChecker := context.WithCancel(context.Background())
defer stopChecker()
go func() {
if err := checker.CheckingLoop(ctx); err != nil {
fmt.Println("checking loop stopped due to fatal error: ", err)
}
}()
<-checker.WaitReady()
// now the checker could be used as shown in the previous example.
A tcp-checker
command-line tool is also available. It can be built with:
go build -o tcp-checker ./cmd/tcp-checker
Or installed directly using go install
:
go install github.com/tevino/tcp-shaker/cmd/tcp-checker
Example usage:
# Check example.com:443 with a 2 seconds timeout
tcp-checker -a example.com:443 -t 2000
See CONTRIBUTING.md to learn how to contribute to the project.
Checker
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.