You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Because HTTP uses mostly textual, character-delimited fields, parsers
are often vulnerable to attacks based on sending very long (or very
slow) streams of data, particularly where an implementation is
expecting a protocol element with no predefined length.
This should be considered for both eio client and server.
This is a meta/parent issue to track specific action items below:
bikallem
changed the title
cohttp-eio(clien/server): valid Content-Length
cohttp-eio(client/server): Mitigate against Attacks via Protocol Element LengthAug 28, 2022
bikallem
changed the title
cohttp-eio(client/server): Mitigate against Attacks via Protocol Element Length
cohttp-eio(client/server): Mitigate Against Attacks via Protocol Element Length
Aug 28, 2022
cohttp-eio
client/server should attempt to mitigate against some of the issues highlighted in the RFC advisory https://www.rfc-editor.org/rfc/rfc7230#section-9.3.This should be considered for both eio client and server.
This is a meta/parent issue to track specific action items below:
References:
The text was updated successfully, but these errors were encountered: