Welcome! Log In Create A New Profile

Advanced

Re: Slow read attack in HTTP/2

Валентин Бартенев
August 19, 2016 09:54AM
On Friday 19 August 2016 18:07:46 Sharan J wrote:
> Hi,
>
> Thanks for the response.
>
> Would like to know what happens in the following scenario,
>
> Client sets its initial congestion window size to be very small and
> requests for a large data. It updates the window size everytime when it
> gets exhausted with a small increment (so send_timeout wont happen as
> writes happens always but in a very small amount). In this case won't the
> connection remain until the server flushes all the data to the client which
> has very less window size?

The same is true with HTTP/1.x, there's no difference.

>
> If the client opens many such connections with many streams, each
> requesting for a very large data, then won't it cause DOS?
>

You should configure other limits to prevent client from requesting
unlimited amounts of resources at the same time.

wbr, Valentin V. Bartenev

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
Subject Author Posted

Slow read attack in HTTP/2

Sharan J August 19, 2016 07:46AM

Re: Slow read attack in HTTP/2

Valentin V. Bartenev August 19, 2016 08:00AM

Re: Slow read attack in HTTP/2

Sharan J August 19, 2016 08:40AM

Re: Slow read attack in HTTP/2

Валентин Бартенев August 19, 2016 09:54AM

Re: Slow read attack in HTTP/2

Sharan J August 22, 2016 03:12AM

Re: Slow read attack in HTTP/2

Valentin V. Bartenev August 22, 2016 06:14AM



Sorry, only registered users may post in this forum.

Click here to login

Online Users

Guests: 212
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 421 on December 02, 2018
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready