TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Varnish and Cache Poisoning

26 pointsby r4umover 9 years ago

2 comments

reader_1000over 9 years ago
I always thought 404 responses would occupy trivial amount of memory on cache since they don&#x27;t have a body. Ok, there is some overhead which might cause issues if there is too much 404. However, I think some guy who is trying to crawl all of your web site is a bigger problem if your web site is big. You can throttle him based on his IP and user agent but how do you differiante people who has same IP because they are behing a cooparete proxy?<p>I also thought cache poisoning means putting a bad response into a cache by sending a special request so that innocent people will be served malicious response because they hit the cache. I think article uses it in a different context.
评论 #10569184 未加载
评论 #10569182 未加载
cbsmithover 9 years ago
tl;dr: it turns out that OS-native caching policies aren&#x27;t really such a great fit for edge caches, varnish should probably have a specific VCL module for intelligently manage cache poising attacks (even something simple for compactly managing 4XX errors would go a long way).