-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
http2: tests for CVE-2019-9512/9517 #612
http2: tests for CVE-2019-9512/9517 #612
Comments
This CVE is not sending Moreover, IMO, CVE-2019-9512, CVE-2019-9515 and CVE-2019-9514 can be combined into one task to solve and test. Just like what golang bugfix does. |
About the reset flood, as the CVE said:
However, if we send an invalid request ( if we send an invalid header, it will also close the connection due to parsing error. So, it seems difficult to exploit reset flood, because I cannot find a condition which just triggers UPDATE: Thanks for @EvgeniiMekhanik advice.
|
@krizhanovsky @const-t @EvgeniiMekhanik
|
Tempesta returns RST_STREAM if request contains invalid |
@RomanBelozerov @krizhanovsky @const-t
Locate the reason using memray: sudo memray run --live ./run_tests.py -nE -v1 t_stress/test_header_leak.py Switch to the polling thread and check the changes in column tempesta-test/framework/deproxy_server.py Line 94 in ab21520
For control frame attack testing and slow read attack testing, the solution (I'd rather say it's a stopgap measure) is to set However, the header leak test did not go well. We have to differentiate between client OOM and tempesta OOM in localhost test environment. That's why we saw that I think we should clear the buffer list at some appropriate point in time, e.g. on the client side, when a request (or batch request) completes and gets a corresponding response, and the same goes for the backend. This is reasonable and I think this is a legacy bug in the code base. |
See discussion
handle_read
method.send_bytes
method from DeproxyClientH2. We need a new directive in frang.send_bytes
method from DeproxyClientH2. I think we need 2 tests: first - without end_stream in requests, second - with a large response body.send_bytes
from DeproxyClientH2socket
,ssl
and `h2 libraries and check as Tempesta use memory and CPU. (You must not read a data from a socket)It depends on 1196
for tempesta-tech/tempesta#1346
The text was updated successfully, but these errors were encountered: