Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

防御慢速HTTP攻击 #661

Closed
luyikk opened this issue Jan 21, 2024 · 2 comments
Closed

防御慢速HTTP攻击 #661

luyikk opened this issue Jan 21, 2024 · 2 comments

Comments

@luyikk
Copy link

luyikk commented Jan 21, 2024

参考问题连接:

hyperium/hyper#2457

h2 当tcp连接上来后,需要对tls验证进行timeout检测,一般是5秒,如果大于5秒没用完成tls验证,需要对连接杀死,并释放资源,tls验证过后,需要对http header 读取进行 timeout 检测,一般5秒,如果超时需要对连接杀死,并释放资源, http header过后需要对body 进行timeout检测,一般5秒,如果超时需要对连接杀死,并释放资源。 以上5秒需要可配置

h1.1 没用tls这一步

h3 目前不清楚,但对应的超时检测 释放相关的资源 应该也是存在的

@chrislearn
Copy link
Member

fuse 分支,尚未测试,你一般用什么工具测试这种慢网速或者 tls 验证问题?

h3 应该还好,一般连接重用,好像一个客户端一般建立一个连接。

另外安全防护是一个复杂的问题,框架层面很难完全解决,甚至于可以说本身就没法解决,只能说加大点攻击难度而已。

@luyikk
Copy link
Author

luyikk commented Feb 10, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants