Welcome! Log In Create A New Profile

Advanced

Re: Slow read attack in HTTP/2

Sharan J
August 22, 2016 03:12AM
Hi,

The scenario which I mentioned was only tested and reported by imperva and
Nginx has said that they have solved this slow read issue.
References:
http://www.imperva.com/docs/Imperva_HII_HTTP2.pdf
https://www.nginx.com/blog/the-imperva-http2-vulnerability-report-and-nginx/

But as you say, the problem still persists? We can prevent a single client
from requesting large amount of resources but what if the attacker uses
multiple machines to make an attack?
Is there any check in nginx to examine the client's initial congestion
window setting and close the connection if it says initial congestion
window size to be less than 65,535 bytes (as mentioned in RFC
<https://tools.ietf.org/html/rfc7540#section-5.2.1> as this to be the
minimum initial congestion window size).

P.S. Please correct me if I misunderstood. Thank you for your responses :)

Thanks,
Sharan

On Fri, Aug 19, 2016 at 7:21 PM, Валентин Бартенев <vbart@nginx.com> wrote:

> On Friday 19 August 2016 18:07:46 Sharan J wrote:
> > Hi,
> >
> > Thanks for the response.
> >
> > Would like to know what happens in the following scenario,
> >
> > Client sets its initial congestion window size to be very small and
> > requests for a large data. It updates the window size everytime when it
> > gets exhausted with a small increment (so send_timeout wont happen as
> > writes happens always but in a very small amount). In this case won't the
> > connection remain until the server flushes all the data to the client
> which
> > has very less window size?
>
> The same is true with HTTP/1.x, there's no difference.
>
> >
> > If the client opens many such connections with many streams, each
> > requesting for a very large data, then won't it cause DOS?
> >
>
> You should configure other limits to prevent client from requesting
> unlimited amounts of resources at the same time.
>
> wbr, Valentin V. Bartenev
>
> _______________________________________________
> nginx mailing list
> nginx@nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
Subject Author Posted

Slow read attack in HTTP/2

Sharan J August 19, 2016 07:46AM

Re: Slow read attack in HTTP/2

Valentin V. Bartenev August 19, 2016 08:00AM

Re: Slow read attack in HTTP/2

Sharan J August 19, 2016 08:40AM

Re: Slow read attack in HTTP/2

Валентин Бартенев August 19, 2016 09:54AM

Re: Slow read attack in HTTP/2

Sharan J August 22, 2016 03:12AM

Re: Slow read attack in HTTP/2

Valentin V. Bartenev August 22, 2016 06:14AM



Sorry, only registered users may post in this forum.

Click here to login

Online Users

Guests: 162
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 421 on December 02, 2018
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready