Re: Denial of Service using invalid Content-Length header

In message <20110620211911.GL2897@1wt.eu>, Willy Tarreau writes:
>On Mon, Jun 20, 2011 at 05:03:32PM +0000, Poul-Henning Kamp wrote:

>> There is no possible timeout value which will both serve slow clients
>> in bad connectivity (iPhone4 ?) and prevent DoS attacks.
>
>Yes in practice you can because even with bad connectivity you're generally
>interested by covering holes as large as 30-60 seconds, 

Well your sever may not crash, but it does not serve legitimate
traffic either.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

Received on Monday, 20 June 2011 21:41:43 UTC