TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

HTTP/2 Denial of Service Advisory

191 点作者 rdli将近 6 年前

10 条评论

iforgotpassword将近 6 年前
Entirely unsurprising. With all this complexity, HTTP2 is on par with a full TCP&#x2F;IP stack. All major operating systems had decades to optimize and bulletproof these, and <i>still</i> to this day we find issues with them every now and then. What did people expect would happen when we start reinventing the wheel yet again, <i>on top of what we already have</i>?<p>And this is just the tip of the iceberg. Consider this a warm-up exercise.
评论 #20691088 未加载
评论 #20690184 未加载
评论 #20688676 未加载
评论 #20691146 未加载
评论 #20691349 未加载
评论 #20690837 未加载
评论 #20688755 未加载
iampims将近 6 年前
I somewhat wish there was a way to test if any http2 server is vulnerable to these issues:<p>* <a href="https:&#x2F;&#x2F;godoc.org&#x2F;golang.org&#x2F;x&#x2F;net&#x2F;http2" rel="nofollow">https:&#x2F;&#x2F;godoc.org&#x2F;golang.org&#x2F;x&#x2F;net&#x2F;http2</a><p>* <a href="https:&#x2F;&#x2F;www.haproxy.com&#x2F;blog&#x2F;haproxy-1-9-has-arrived&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.haproxy.com&#x2F;blog&#x2F;haproxy-1-9-has-arrived&#x2F;</a><p>* <a href="https:&#x2F;&#x2F;repo1.maven.org&#x2F;maven2&#x2F;org&#x2F;eclipse&#x2F;jetty&#x2F;http2&#x2F;" rel="nofollow">https:&#x2F;&#x2F;repo1.maven.org&#x2F;maven2&#x2F;org&#x2F;eclipse&#x2F;jetty&#x2F;http2&#x2F;</a><p>* etc…<p>Larger list at <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;HTTP&#x2F;2#Server_software" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;HTTP&#x2F;2#Server_software</a>
评论 #20690651 未加载
评论 #20691080 未加载
评论 #20689063 未加载
judge2020将近 6 年前
Cloudflare post on this: <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;on-the-recent-http-2-dos-attacks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;on-the-recent-http-2-dos-attacks...</a>
netsectoday将近 6 年前
Here is a server vulnerability matrix... pretty much if you are running HTTP&#x2F;2 you are exposed and your vendor has a patch waiting for you.<p><a href="https:&#x2F;&#x2F;vuls.cert.org&#x2F;confluence&#x2F;pages&#x2F;viewpage.action?pageId=56393752" rel="nofollow">https:&#x2F;&#x2F;vuls.cert.org&#x2F;confluence&#x2F;pages&#x2F;viewpage.action?pageI...</a>
评论 #20692451 未加载
jrockway将近 6 年前
Envoy appears to have been updated today to 1.11.1 to mitigate some of these issues. I upgraded and have not experienced any problems yet.
mholt将近 6 年前
Caddy is patched. v1.0.2. <a href="https:&#x2F;&#x2F;github.com&#x2F;caddyserver&#x2F;caddy&#x2F;releases&#x2F;tag&#x2F;v1.0.2" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;caddyserver&#x2F;caddy&#x2F;releases&#x2F;tag&#x2F;v1.0.2</a>
dsign将近 6 年前
It&#x27;s a nice write-up, really, but any HTTP&#x2F;2 implementation should be tested with a nice packet fuzzer. Indeed, server providers should compete in the square miles of the datacenter they use to run the fuzzer. Also, the best servers should come with several defense perimeters, including one with geo-ip-directed tactic missiles. Nothing less will do.
评论 #20691090 未加载
mjevans将近 6 年前
Is there a better list of fixed versions for E.G. Apache &#x2F; Lighttpd (n&#x2F;a No http&#x2F;2 support) &#x2F; Nginx?
评论 #20688980 未加载
评论 #20689278 未加载
cryptonector将近 6 年前
Flow control in application protocols over TCP has been tried (in SSHv2), and it&#x27;s failed. In SSHv2 flow control acts as a handbrake on all channels -- not good, though it does fix the starving of non-bulk channels by bulk channels. It&#x27;s bound to fail in HTTP&#x2F;2 as well.
评论 #20692616 未加载
jedisct1将近 6 年前
Of course this affects DoH servers, too.