non-tls - Case 7.1.6 : Informational - 9 ms @ 2021-07-05T07:51:38.334Z
Case Description
Send 256K message followed by close then a ping
Case Expectation
Case outcome depends on implementation defined close behavior. Message and close frame are sent back to back. If the close frame is processed before the text message write is complete (as can happen in asynchronous processing models) the close frame is processed first and the text message may not be received or may only be partially recieved.
Case Outcome
Close was processed before text message could be returned.
Expected:
{'NON-STRICT': [], 'OK': [('message', u'Hello World!', False)]}
Observed:
[]
Case Closing Behavior
Connection was properly closed (INFORMATIONAL)
GET /echo/message HTTP/1.1 User-Agent: AutobahnTestSuite/0.8.2-0.10.9 Host: localhost:9998 Upgrade: WebSocket Connection: Upgrade Pragma: no-cache Cache-Control: no-cache Sec-WebSocket-Key: HXSNnEVB+hrZnHhPAyS50Q== Sec-WebSocket-Version: 13
HTTP/1.1 101 Switching Protocols Content-Length: 0 Date: Mon, 05 Jul 2021 07:51:38 GMT Server: nbio Upgrade: websocket Connection: Upgrade Sec-Websocket-Accept: H9MvrPCj9mSfRWrovjNaEJzYQLA=
Key | Value | Description |
isServer | False | True, iff I (the fuzzer) am a server, and the peer is a client. |
closedByMe | True | True, iff I have initiated closing handshake (that is, did send close first). |
failedByMe | False | True, iff I have failed the WS connection (i.e. due to protocol error). Failing can be either by initiating closing handshake or brutal drop TCP. |
droppedByMe | False | True, iff I dropped the TCP connection. |
wasClean | True | True, iff full WebSocket closing handshake was performed (close frame sent and received) _and_ the server dropped the TCP (which is its responsibility). |
wasNotCleanReason | None | When wasClean == False, the reason what happened. |
wasServerConnectionDropTimeout | False | When we are a client, and we expected the server to drop the TCP, but that didn't happen in time, this gets True. |
wasOpenHandshakeTimeout | False | When performing the opening handshake, but the peer did not finish in time, this gets True. |
wasCloseHandshakeTimeout | False | When we initiated a closing handshake, but the peer did not respond in time, this gets True. |
localCloseCode | 1000 | The close code I sent in close frame (if any). |
localCloseReason | None | The close reason I sent in close frame (if any). |
remoteCloseCode | 1000 | The close code the peer sent me in close frame (if any). |
remoteCloseReason | None | The close reason the peer sent me in close frame (if any). |
Chop Size | Count | Octets |
4 | 1 | 4 |
199 | 1 | 199 |
Total | 2 | 203 |
Chop Size | Count | Octets |
6 | 1 | 6 |
8 | 1 | 8 |
18 | 1 | 18 |
252 | 1 | 252 |
262158 | 1 | 262158 |
Total | 5 | 262442 |
Opcode | Count |
8 | 1 |
Total | 1 |
Opcode | Count |
1 | 2 |
8 | 1 |
9 | 1 |
Total | 4 |
000 TX OCTETS: 474554202f6563686f2f6d65737361676520485454502f312e310d0a557365722d4167656e743a204175746f6261686e5465
737453756974652f302e382e322d ...
001 RX OCTETS: 485454502f312e312031303120537769746368696e672050726f746f636f6c730d0a436f6e74656e742d4c656e6774683a20
300d0a446174653a204d6f6e2c20 ...
002 TX FRAME : OPCODE=1, FIN=True, RSV=0, PAYLOAD-LEN=10, MASK=9a2c4881, PAYLOAD-REPEAT-LEN=262144, CHOPSIZE=None, SYNC=False
BAsd7&jh23
003 TX OCTETS: 81ff00000000000400009a2c4881d86d3be5ad0a22e9a81f0ac0e9487fa7f0447ab2d86d3be5ad0a22e9a81f0ac0e9487fa7
f0447ab2d86d3be5ad0a22e9a81f ...
004 TX FRAME : OPCODE=1, FIN=True, RSV=0, PAYLOAD-LEN=12, MASK=8961c7b3, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
Hello World!
005 TX OCTETS: 818c8961c7b3c104abdfe64190dcfb0da392
006 TX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASK=f2a397d2, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
0x03e8
007 TX OCTETS: 8882f2a397d2f14b
008 TX FRAME : OPCODE=9, FIN=True, RSV=0, PAYLOAD-LEN=0, MASK=fafbdee1, PAYLOAD-REPEAT-LEN=None, CHOPSIZE=None, SYNC=False
009 TX OCTETS: 8980fafbdee1
010 FAIL CONNECTION AFTER 1.000000 sec
011 RX OCTETS: 880203e8
012 RX FRAME : OPCODE=8, FIN=True, RSV=0, PAYLOAD-LEN=2, MASKED=False, MASK=None
0x03e8
013 TCP DROPPED BY PEER