-
Notifications
You must be signed in to change notification settings - Fork 562
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ffuf module blocking event loop #1674
Comments
It's going through the entire word list and finding values that match a given prefix, etc. Honestly If you made me guess, I would have said it would have taken a lot longer. 3 seconds doesn't seem that bad for this. That being said, I think I can see a way to squeeze a tad more optimization out of it... |
3 seconds is an extremely long time to block the event loop. With thousands of open TCP and UDP connections that need attention, blocking for even more than .1 second is unacceptable. Anything that blocks for longer than that needs to be executed using the process pool. |
"Anything that blocks for longer than that needs to be executed using the process pool." While I do think i could optimize it some, even with 50% better optimization that would still be over a second. So it sounds like that's what needs to happen. |
Well, I did even a little better than 50% i think... Against my .NET vulnerability playground designed to test ffuf_shortnames... before #1696 : after: if you still want to put it in process jail feel free but this should help a lot I think. |
should be at least partially addressed with #1696 |
Tested avg, before optimization (stable): @liquidsec do you know what case would have caused those high processing times of 3+ seconds? EDIT: nevermind I'm a dummy. |
The ffuf module is blocking the event loop for 3+ seconds:
The offending function is
generate_templist()
. We need to figure out why this function is so CPU-heavy and make it more efficient.The text was updated successfully, but these errors were encountered: