On Friday, July 27, 2012 at 8:15 PM, Shannon Posniewski wrote:
(I haven't been able to find anything in the docs about this. Apologies if I've missed it.)Are there any settings or something built in to socket.io which can restrict the size of payloads being sent to the server? For example, an evil person could modify the client-side source after handshake and send an emit back to the server with a giant payload.A reasonable recourse to a client sending such a flood (IMO) would by dropping the connection. The intent here is to stop or otherwise shut down a rogue client before it damages the server (either by crashing it with a memory shortage, or simply slowing it down).shannon