W3C home > Mailing lists > Public > ietf-http-wg@w3.org > April to June 2011

Re: Denial of Service using invalid Content-Length header

From: Poul-Henning Kamp <phk@phk.freebsd.dk>
Date: Mon, 20 Jun 2011 21:41:10 +0000
To: Willy Tarreau <w@1wt.eu>
cc: Jan Starke <jan.starke@outofbed.org>, ietf-http-wg@w3.org
Message-ID: <32077.1308606070@critter.freebsd.dk>
In message <20110620211911.GL2897@1wt.eu>, Willy Tarreau writes:
>On Mon, Jun 20, 2011 at 05:03:32PM +0000, Poul-Henning Kamp wrote:

>> There is no possible timeout value which will both serve slow clients
>> in bad connectivity (iPhone4 ?) and prevent DoS attacks.
>
>Yes in practice you can because even with bad connectivity you're generally
>interested by covering holes as large as 30-60 seconds, 

Well your sever may not crash, but it does not serve legitimate
traffic either.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.
Received on Monday, 20 June 2011 21:41:43 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Friday, 27 April 2012 06:51:41 GMT